Cyber Security Blog
What is the Cybersecurity Maturity Model Certification (CMMC)?
By Lionfish Cyber Security |
Author TruMethods Standards Manager, Brian Dappolone If you have not heard of the Cybersecurity Maturity Model Certification (CMMC) yet, it is not the end of the world. The latest certification requirements were finalized by the Department of Defense (DoD) on January 31st and at the moment ...
Read More Recommended Best Practices for a Secure Supply Chain
By Lionfish Cyber Security |
Your business’ cybersecurity posture must prioritize detection, evaluation and mitigation of risks posed by your supply chain. It is vital that your security is upgraded on a regular basis to better prepare for any worst-case scenarios. Having said that, it should come as no surprise ...
Read More Defense Strategies to Combat Insider Threats
By Lionfish Cyber Security |
Insider threats are among the most dangerous cyberthreats out there. Yet, organizations of all sizes seem to be either reluctant or negligent when it comes to fighting them. Over 50 percent of organizations don’t have an Insider Risk Response Plan and 40 percent don’t assess ...
Read More Securing Your Remote Workers
By Lionfish Cyber Security |
Over the last few years, we have seen several tech companies, such as Buffer, Todoist and Help Scout, to name a few, switch to a fully remote or partial work setup. Most of these companies spent months preparing for the switch by training their employees, ...
Read More Have You Seen These Parental Control Options?
By Lionfish Cyber Security |
Are your kids safe online? The Internet is a DANGEROUS place - so if you have children or teens, you’ve probably thought about their safety online more than once. Not taking action can lead to all kinds of TROUBLE down the road, so here’s what ...
Read More Making Security Awareness Second Nature
By Lionfish Cyber Security |
Your business’ security program must start with your employees and strong security policies rather than entirely depending on your IT team or the latest security solutions. You can significantly reduce the likelihood of a data breach by combining a well-drafted cybersecurity policy with comprehensive security ...
Read More