The Recap: 9 Topics We Covered for National Cybersecurity Awareness Month

By Cybersecurity

We covered a range of topics over the past several weeks. If you missed some (or all) of them see the summaries below, and click to learn more. Passwords: How to Make the Best of a Bad Situation Love ’em or hate ’em, passwords are a part of digital life. Learn how these 5 simple rules can reduce your chance of compromise. How to Avoid the Ransomware Terror The Dastardly evil-doer has taken your system hostage. Do you pay the ransom, or lose your files forever? Learn about a third option in our ransomware article. How to Protect Against Phishing…

Read More

Why You Need a Vulnerability Assessment

By Cybersecurity

In the ninth article in our 10-article series for National Cybersecurity Awareness Month, we explain one of our favorite places to start: the vulnerability assessment…and why it’s important. What Is a Vulnerability Assessment? A proper vulnerability assessment looks at the system architecture, data flows and IT processes for an organization. You need to understand security controls around the network, ensure security devices are properly configured, ensure best practices for secure configurations are in place, and much more. There are a lot of benefits to getting a thorough vulnerability assessment done, including: Comprehension of What’s Actually on your Network — You…

Read More

SIEM Overview

By Cybersecurity

In this article, our eighth in the Cybersecurity Awareness Month series, we talk SIEM: what it is, why it’s beneficial and some example use cases pulled from my experience in the security world. What is SIEM? SIEM (usually pronounced ‘seem’ or ‘sihm’) stands for Security Information and Event Management. It comes in several forms and various price points, including as a software product, appliance or as a service. SIEM collects log and event information from servers, security devices, network devices and applications. It’s a single window into all of your network activity. If you like movie references, think of it…

Read More

The State of IoT

By Cybersecurity, Internet of Things

This is the seventh article in our 10-part series for National Cybersecurity Awareness Month. Look for new cybersecurity topics explained by Alpine Cyber experts every Tuesday and Thursday in October.  Revisiting the Topic Nearly 4 years ago I wrote a primer and deeper dive into the Internet of Things (IoT) explaining what it was and the security aspects you should consider when leveraging this class of technology. So how have things evolved in that time? What is still relevant and have things gotten better or worse? Well here’s an update… Consumer Exposure For one, you don’t really hear the term…

Read More

Put It In the Cloud. It’s Safer There.

By Cloud Computing, Cybersecurity

This is the sixth article in our 10-part series for National Cybersecurity Awareness Month. Look for new cybersecurity topics explained by Alpine Cyber experts every Tuesday and Thursday in October.  Times Have Changed – For the Better It wasn’t long ago – maybe 10 years – that the headline of this article would have blown my mind.  And I’d probably have dismissed this whole blog post as ridiculous propaganda.  But times have changed. If you’re still a cloud naysayer, even after all this time, I don’t expect this little post to fully change your mind.  But maybe it can put…

Read More