Best Practices for Securing Your Organization’s EmailClear policies: Get IT and business leaders to formulate clear security policies, including email-specific ones.Reinforcement: Make email security practices part of employee onboarding, ongoing training, and performance reviews.Buy-In: Buy-in for the company’s security strategy from non-security peers is crucial for good security outcomes for SMBs.Learning from incidents: Leverage email […]
Cyber Security for County Government in 2022
Sheri Donahue’s presentation to KCJEA/KMCA Joint Summer Conference on June 8, 2022, Griffin Gate Marriott in Lexington
CVE for Cyber Security (Not the Police CVE Program)
Every industry has its buzzwords and acronyms. When I transitioned from working for the Navy to working in cyber security, I learned that many of the terms I knew meant different things in cyber than they did in DoD.In the state of Kentucky for example, the acronym CVE stands for “Commercial Vehicle Enforcement” which is […]
Lincoln College to Close after 157 Years Following Cyber Attack
History is a wonderful teacher. We learn from experiences. Often we learn more from misfortune and hardships than we do from the smooth and steady times.Lincoln College, a historically black college in Illinois, has triumphed over many obstacles in its 157-year history. Founded in 1865 and named after then-president Abraham Lincoln (the only college named […]
We Have Enough Security…Why Do We Need More?
You can never have too much security, can you?Definitely, you can have too little.Often people will tell us that they have anti-virus or a firewall, so they are fine. This is wrong for two reasons.First, anti-virus and firewalls are not enough. An anti-virus will only stop known viruses. They won’t contain new or unknown viruses […]