Configuration management an important layer of cybersecurity defense

In my last posting Proactive IT Support on Display I shared a story describing elements of Endsight’s  configuration management process in action.  I summarized steps in a well established process to identify, control, account for and audit changes and so I thought it made sense to expand on configuration management in more detail. Configuration Management. Configuration management is the process of identifying,… Read more »

Data classification is key to effective cybersecurity

Data classification is key to effective cybersecurity

Effective cybersecurity begins with a disciplined approach to data classification With labels like confidential and top secret, data classification is mostly thought about in the context of the military or the government, but it’s also a critical piece of cybersecurity. The function of data classification is to develop sensitivity labels for data and assign  those labels for the purpose of… Read more »

Identity Theft Post Equifax

      Comments Off on Identity Theft Post Equifax

We all need to give more attention to identity theft in the wake of the Equifax breach Most of us already know that Equifax reported a data breach that affects more than 143 million US customers, about 44% of the population. It’s an extremely serious breach; hackers got access to full names, Social Security numbers, birth dates, addresses, driver’s license numbers —… Read more »

G-Suit Tutorial Part 1: Gmail Tips

      Comments Off on G-Suit Tutorial Part 1: Gmail Tips

Easy to use Gmail tips to help you get a little more done each day. Gmail is truly a full featured email client.  But like all mature software, many of it’s best features go unused.  Here are a couple of Gmail Tips that I thought you should know about.  I know that once I learned of them, it helped me… Read more »

Proactive IT Support on Display

      1 Comment on Proactive IT Support on Display

The lack of proactive IT support is a very consistent reason that people give for considering an alternative to their current IT support provider.  It’s also a clear sign that cyber security is a likely issue as well. I’m often told, “I just thought my provider was looking out for this stuff.”  And the prospect’s  frustration is justifiable when her… Read more »

Protect yourself from CEO Fraud

      1 Comment on Protect yourself from CEO Fraud
CEO Fraud Image

CEO Fraud is a very simple and effective cyber attack that can cause significant business losses CEO Fraud couldn’t be simpler. There’s no malware to write and no malicious code or links to implant. It’s a text only email, plain and simple – but it’s the social engineering that makes it work. Due to its simplicity, these spoofing attacks are one… Read more »

Microsoft Excel: Tips to Manage Data Better and Gain More Insights

Microsoft Excel: Tips to Manage Data Better and Gain More Insights Microsoft Excel lets you manipulate, visualize, and share your data. New functions now in Excel 2016 make it simpler and faster to build common calculations, find functions, and chart your data so it can provide useful insights. In this  on-demand seminar, Jason Clause from Endsight will share a few… Read more »

Cyber Security Roles and Responsibilities

Cyber Security Roles and Responsibilities

Cyber security is not a new thing, but even so, it feels that way.  High profile attacks and data breaches increase public awareness of the issue and the overarching feeling seems to be, “you’re not safe anymore.” Hyped up issues tend to be easy to click and share, but there is typically a lot of nuance and detail to unpack… Read more »

LinkedIn Profile Best Practices

LinkedIn allows a savvy user to tap into an expansive network of professionals, companies and groups in her industry and beyond. Discover how to make the most of your LinkedIn account.  In this  on-demand seminar, Jason Clause from Endsight will share how to build a stellar LinkedIn profile, how to expand your network, join groups, share updates, and contribute your… Read more »

We are ALL loved by God with an everlasting love

  The LORD appeared to us in the past, saying: “I have loved you with an everlasting love; I have drawn you with loving-kindness. – Jeremiah 31:3 Read Jeremiah 31:3 in context  I try to make a point of telling my daughters that God loves them no matter what.  It’s important to me they know that, because I know that sometimes it might… Read more »