Effective Practices

Information security awareness is ongoing.  Effective security practices essential and are comprised of three things:

  • People
    Three interlocking circles with the words People, Process, Technology.
  • Processes
  • Technology

Of these three people are the weakest link because they control the other two and have the ability and the tendency to change.  Security awareness programs require enormous effort to educate and remind people of the need for consistent security practices.

Additionally, changes to technology mandate continual updating and modification to processes and to the understanding people have of current technologies.

Here's a list of information security topics for technical and non technical people.
Security Awareness

Topics cover personal and business aspects of information security.  What is done at home can affect work. And vice versa.  It pays to always be cyber safe.

Basic and Advanced Internet Safety Tips - security practices

Safe Cyber Practices

Mobile Device Security

Passwords / Passphrases - Passwords are the keys to the kingdom.  Learn how to manage and create passwords that protect.

Password Management

Phishing - Cyber attacks occur daily.  We must be vigilent because no one knows when or where they will pop up. Phishing, the #1 cyber threat, is growing because it leads to identity theft and ransomware, the other growing security concern. Read up on those here.


Personal Security Practices

Improving your personal cyber hygiene increases information security at work too!  Here's some articles to assist.

Detect Identity Theft - Check Credit Reports  -  If you suspect you're a victim of identity theft here's how to detect and protect yourself.

Place a Fraud Alert

Read up on the 2017 Equifax Breach and how you can protect yourself from the fallout.

Cyber Shopping  - Thieves are always looking for ways to steal your money or your identity.  Read more here.


Gift Cards

Tax Season Security Tips

Internet of Things (IoT) - Sometimes hackers capitalize on your technology by using your computing power for nefarious purposes or to spy on you and your loved ones.  Read how you can protect yourself here.