Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityPodcastsQuestions & AnswersView All Resources What are some little-known cybersecurity incursions of the early 21st century? How about a great story about a cybersecurity incursion in the late 20th century? What’s…Kip BoyleFebruary 11, 2020
Cybersecurity Executive ToolkitNetwork SecurityQuestions & AnswersView All Resources Can the WiFi owner see what I’m browsing? Yes, in the U.S., they have both the right and ability to monitor your online…Kip BoyleFebruary 4, 2020
Cybersecurity Executive ToolkitNetwork SecurityQuestions & AnswersView All Resources Is it worth paying for a VPN? If you need a VPN, then it's worth paying for one. I suggest you choose…Kip BoyleJanuary 28, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork Security What is more important, length or diversity of a password? Length. Here’s a simple example. Which of these passwords is more attack-resistant? &^567*=M barbell-farther-grocery-sans-bluster-voyageur It’s…Kip BoyleDecember 24, 2019
Cybersecurity Executive ToolkitNetwork SecurityQuestions & AnswersView All Resources How Does WPA3 Offer Better Security? WPA3 delivers several security improvements. Here’s a big one: When you connect to an open…Kip BoyleDecember 3, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityQuestions & AnswersSecurity Risk AsessmentView All Resources How can cybersecurity leaders minimize human error? There are two main strategies I use when I’m in the role of CISO: Make…Kip BoyleNovember 19, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityQuestions & AnswersView All Resources How long, on average, does it take a company’s stock value to recover after a data breach? “Share prices of breached companies hit a low point approximately 14 market days following a…Kip BoyleNovember 12, 2019
Cybersecurity Executive ToolkitNetwork SecurityQuestions & AnswersView All Resources What’s the best password keeper that’s not based online? A journal of blank pages that you keep under lock and key when you’re not…Kip BoyleNovember 5, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityQuestions & AnswersView All Resources How can I delete all the information in my computer? For routine uses, I recommend “Darik's Boot and Nuke” (DBAN) using the “DoD Short” method.…Kip BoyleOctober 29, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityQuestions & AnswersView All Resources How good is Dashlane password management software? I’m not sure about Dashlane, but I can help you figure it out. Password managers…Kip BoyleOctober 22, 2019