Lauren YaconoInternal Change Caused Twitter OutageIt may be hard to Imagine an entire infrastructure screeching to a halt due to one simple change. However, as many noticed, that’s what…Mar 16, 2023Mar 16, 2023
Lauren YaconoEnterprise Ransomware Protection: Essential Tips and ToolsDoes your enterprise have a spare half million dollars to spend recovering from a ransomware attack? Maybe, but I’m sure your board would…Feb 16, 2023Feb 16, 2023
Lauren YaconoCybersecurity Posture Assessment: What Is It & How to Conduct OneIf a sophisticated hacker targeted your organization tomorrow, how prepared are you to prevent, detect, or recover from that breach?Feb 9, 2023Feb 9, 2023
Lauren YaconoTop 7 Network Security Risks (And How to Mitigate Them)It’s an unpleasant truth that businesses must face: Between vulnerabilities and the ever-changing IT landscape, network security risks…Jan 19, 2023Jan 19, 2023
Lauren YaconoCyber Security and Compliance: 4 Most Common MistakesPeanut butter and jelly. Thunder and lightning. Cyber security and compliance.Dec 15, 2022Dec 15, 2022
Lauren YaconoAssess Your Cybersecurity Posture in 5 Easy StepsAre your cybersecurity measures up to snuff? If you don’t have a comprehensive way to assess your cybersecurity posture, you may not know…Oct 20, 2022Oct 20, 2022
Lauren Yacono5 Top Ransomware Detection Techniques To Keep Your Data SafeDoes your organization have a quarter of a million dollars to throw away on a ransomware attack? Perhaps, but it is likely the leadership…Sep 29, 2022Sep 29, 2022
Lauren YaconoIntegrity: The Missing Component of Zero TrustTo deliver Zero Trust principles at all four layers, organizations need three things:Aug 9, 2022Aug 9, 2022
Lauren YaconoMicro-Segmentation Zero Trust: Your Guide To The FundamentalsMicro-segmentation. Zero Trust. Fine-grained access control. Role-based access control.Aug 4, 2022Aug 4, 2022
Lauren YaconoANSWERED: How To Implement Zero Trust in Your OrganizationCorporate cybercrime is on the rise.Jul 22, 2022Jul 22, 2022