Sage Advice - Cybersecurity Blog

Loren Lachapelle

Recent Posts

What to Know about Location Tracking

In today’s world, it can be time consuming to keep up with the current cyberthreat landscape, especially when many organizations do not have dedicated security staff. However, the landscape changes daily, and it’s important to be aware of what’s happening in the digital world that surrounds you.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Mobile Security, Privacy

Why You Need Strong Passwords

Passwords are essential to keep both your professional and personal information protected. With nearly all business being conducted online and many of us working remotely, we all have multiple accounts to manage. Strong, unique passwords are a great defense against hackers.

Read More

Topics: Cybersecurity Tips, Cyber Defense, Cybersecurity Awareness, Penetration Testing

12 Tips to Defend Against Cyberattacks

The cyberthreat environment changes every day. New malware is developed, new social engineering tactics are deployed, and fraud is seemingly lurking around every corner. Because of the cybersecurity risk that these threats pose, we are all responsible for doing our part to keep information secure at home and at work.

Read More

Topics: Cybersecurity, Social Engineering, Cyber Defense

A Programmatic, Risk-Based Approach

Cybersecurity, as we know it today, is defined as the “the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information,” according to the Cybersecurity & Infrastructure Security Agency. In the 1990s, organizations across the globe started to practice information security to keep data safe. A few years later – as cybercriminals continued to get more sophisticated and organizations had to face the devastating consequences – the idea of cybersecurity over information security evolved.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Cybersecurity Awareness

Information Security vs. Cybersecurity

Before cybersecurity became a standard part of our lexicon, the practice of keeping information and data safe was simply known as information security. Although the two terms are still used interchangeably, there is a definite distinction between the two, which provides context and explains the evolution this discipline has recognized over the past two decades. This paradigm provides perspective and instruction for when your organization starts to build and implement a cybersecurity program today.

Read More

Topics: Security Policy, Information Security

Cybersecurity Maturity: Tiers and Goals

Achieving cybersecurity maturity is something that organizations should strive to reach over time. Once an organization has a mature cybersecurity program, they will be equipped with the knowledge and power to adapt to the ever-changing threat landscape – a key to becoming a resilient organization. It sounds simple, but gaining cybersecurity maturity is a fluid, never-ending work in progress that should always be improved upon. Let’s dive in.

Read More

Topics: Cybersecurity, Security Policy, Cybersecurity Culture

What Makes a Strong Password?

Between personal accounts and work accounts, the sheer number of credentials and passwords that we have to manage can be overwhelming and inconvenient – especially if we forget them. While managing passwords may be a pain, it’s necessary if we want to protect our personal information. After all, cybersecurity is everyone’s responsibility. 

Read More

Topics: Cybersecurity Tips, Cybersecurity Awareness

Meet Our Penetration Testers

At Tyler Cybersecurity, our analysts and consultants are there for organizations like yours every day. Their jobs are to help protect and empower you while sharing their cybersecurity knowledge, so you can be well-informed and armed with necessary tools in the event of an incident.

Read More

Topics: Cybersecurity, Penetration Testing

6 Quick Wins for Your Security Posture

The world of cybersecurity – and our threat landscape – is ever-changing. From new types of malware being introduced, to new phishing tactics, anything can happen as hackers work to refine their techniques and target their cyberattacks, hoping to get into your network unnoticed.

Read More

The 2020 Threat Outlook

Hackers are constantly developing new ways to infect systems globally. As threat detection services and security teams catch on to their tactics, they continue to build and deploy new malware to feed their personal wallets. We are seeing more malware than ever, and this cycle will only get worse. Let’s review the predicted threat environment for 2020.

Read More

Topics: Threat Intelligence, Cyber Defense, Cybersecurity Awareness