Cybersecurity Executive ToolkitCybersecurity PolicyNetwork Security What is more important, length or diversity of a password? Length. Here’s a simple example. Which of these passwords is more attack-resistant? &^567*=M barbell-farther-grocery-sans-bluster-voyageur It’s…Kip BoyleDecember 24, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityQuestions & AnswersSecurity Risk AsessmentView All Resources How can cybersecurity leaders minimize human error? There are two main strategies I use when I’m in the role of CISO: Make…Kip BoyleNovember 19, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityView All Resources What are the key topics you would cover in your initial one-hour basic training program on security for non-IT personnel? Q: What are the key topics you would cover in your initial one-hour basic training…Kip BoyleMay 28, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyView All Resources How can we control cybercrime? We've just begun a series of blog posts that cover some of the most common…Kip BoyleMay 14, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityView All Resources How often should I change my online passwords for maximum safety? Here are my best practices for online passwords: Do not reuse passwords with different accounts.…Kip BoyleMay 7, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyCybersecurity ThreatsSecurity Risk AsessmentView All Resources What should I look for when shopping for a VPN for everyday use? People often ask me questions about cybersecurity. Over the next several weeks I'm going to…Kip BoyleApril 30, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyCybersecurity ThreatsNetwork SecurityView All Resources The Anatomy of a Hack: The Internet Age of Criminals – Part 4 In previous posts, I’ve explained how cybercrime is big business, and the criminals behind the…Kip BoyleApril 16, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyCybersecurity ThreatsSecurity Risk AsessmentView All Resources Two Easy Steps to Combat Ransomware The following is adapted from Fire Doesn’t Innovate. Ransomware is one of the nastiest types…Kip BoyleMarch 19, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecuritySecurity Risk AsessmentView All Resources 3 Steps to Improve Your Online Account Security The following is adapted from Fire Doesn’t Innovate. We all know people whose definition of…Kip BoyleMarch 12, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecuritySecurity Risk AsessmentView All Resources Don’t Let Your Company’s Digital Assets End Up on the Dark Web The following is adapted from Fire Doesn’t Innovate. For as long as people have had…Kip BoyleFebruary 19, 2019