Tag Archives: infographic

An Infographic to Implement an IT Governance, Risk, and Compliance Framework and a Risk Management Framework

I built an Infographic to Implement an IT Governance, Risk, and Compliance Framework and a Risk Management Framework. I do hope everyone finds it useful. A good solid framework is a critical foundation to lay for managing risk in businesses … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on An Infographic to Implement an IT Governance, Risk, and Compliance Framework and a Risk Management Framework

Infographic on Cyber Insurance and How It Helps to Deal with a Breach

Posted in Security Blog | Tagged , , , , | Comments Off on Infographic on Cyber Insurance and How It Helps to Deal with a Breach

What is GRC?

Governance, Risk, and Compliance. A nice infographic.

Posted in Security Blog | Tagged , , , , | Comments Off on What is GRC?

Tech Support Scam Infographic

Here is a cool infographic that Microsoft created. I love infographics with numbers in them. 50% of Millennials are normally scammed. 34% are about my age. 17% are old… like my boss at work :)

Posted in Security Blog | Tagged , , , , , , , , , , , , , , | Comments Off on Tech Support Scam Infographic

Social Media Security

Here is an infographic on Social Media Security Basics

Posted in Security Blog | Tagged , , | Comments Off on Social Media Security

60% of BYOD Users Use the Same Device to Download Pirated Content

In a recent poll in the UK, sixty percent of users who use their personal device for accessing corporate data, also use the exact same device to download pirated content off of ‘bad sites’ that are usually laden with nudity … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on 60% of BYOD Users Use the Same Device to Download Pirated Content

It’s Tax Season ∴ CyberThieves Are Working Full Time!

With most things going electronic, it’s beneficial to be aware of some of the tricks a con-artist would use to get your W-2 and try to claim your tax refund before you have the chance to. One popular method is … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on It’s Tax Season ∴ CyberThieves Are Working Full Time!

Cyber Monday…. Scammers Are Coming!

As you know, with Cyber Monday coming up and all the online shopping you are all doing, you and everybody you know will be hit in the email and all over your social media with probable scams. Be Aware and … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Cyber Monday…. Scammers Are Coming!

SPY Car!

Is a name for an Act for the “Security and Privacy in Your Car Act of 2015. An act that requires automakers to adhere to certain standards of protection against privacy and hacking that would be developed by the Federal … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on SPY Car!

Your Evolving Digital Life

Click the graphic to learn more about NCSAM!

Posted in Security Blog | Tagged , , , , , | Comments Off on Your Evolving Digital Life