Sitemap

Zero Trust Prevents Data Breaches, Not Intrusions

After ten years building momentum and proving itself in businesses and government agencies worldwide, Zero Trust is finally getting the serious recognition it warrants. President Biden’s emphasis on “Zero Trust Architecture” in his May 2020 Executive Order on...

Why is Zero Trust Suddenly So Hot?

If you haven’t heard about Zero Trust yet, you’ve been hiding under an impressively large rock. From President Biden on down, Zero Trust is being hailed as the silver bullet that could send hackers packing once and for all. Why is Zero Trust now at the forefront of...

Keep Your Remote Workforce Safe & Secure – Free Security Awareness Education Videos about Phishing & Passwords

We pulled two of our best educational videos out of our Security Awareness Education (SAE) platform to help educate the increased remote workforce on two of the most important topics: Avoid being Phished & Leverage Strong Passwords.   If you currently do not...

What is Zero Trust and Why Do We (as an Org with Sensitive Data) Care?

In the wake of recent mega-hacks, Zero Trust is big news. In fact, “Zero Trust architecture” is the end goal of President Biden’s recent Executive Order on Improving the Nation’s Cybersecurity. What exactly is Zero Trust? And how do we achieve it? Is it a software...

SIM Versus DLP – Which Should We Get First?

For a business looking to balance detection and prevention in its cybersecurity program, two favored technology investments are Security Information Management (SIM) and Data Loss Prevention (DLP) solutions. But which should you get first? Or do you need both? To...

The Real Reason Why Executives Ignore Security Priorities

Is your company ignoring security? Or making fundamental security mistakes that leave it vulnerable to a devastating ransomware attack or other hack? To give technical and business leaders a pragmatic, informed view of what really matters in cybersecurity, Dr. Eric...

The True Role of a CISO

Is a CISO’s role to focus on technical issues? Or should CISOs ideally have a bigger-picture, business-centric view in addition to understanding the technology? To reframe cybersecurity to help SMBs strike the right balance between system functionality and risk...

Why Detection – Not Prevention – Should be the Goal of Your Cybersecurity Program

Is your cybersecurity program pointed in the right direction? Many security efforts focus on preventing attacks, but in practice that’s next to impossible. Is an emphasis on detection and response better at reducing the impact of attacks? To share foundational...

The 3 (Make that 4) Non-Negotiable Cybersecurity Rules for SMBs

Is your SMB one of the many that doesn’t have a CISO? Or even a professional security team? So, how do you make good decisions to manage cyber risk? To share crystal clear, foundational best practices to help SMBs take a big step forward with security, Dr. Eric Cole,...

The Right Way to View Cyber Risk Assessment

Does your business do any form of cybersecurity risk assessment, formal or informal? When you consider adding technical functionality, do you weigh the risks? Or do you just focus on the benefits? Dr. Eric Cole, well-known author and Founder/CEO of Secure Anchor...