Sage Advice - Cybersecurity Blog

5 Tips to Secure Your Home Office

We’re a year in to the COVID-19 pandemic in the U.S. There are still millions of people working from home, and studies suggest that the model of working remotely – whether full-time, part time, temporary, or permanent – probably won’t go away completely anytime soon. A Gartner survey revealed that 82% of organizations will continue to allow increased work from home (WFH) days post-pandemic, and some 47% are considering allowing employees to WFH full-time post-pandemic. That’s a huge percentage of the workforce. Having a safe and secure at-home network is becoming increasingly important (and necessary) to keep cybercriminals away from your personal and professional data.

Following are five tips, gathered from SANS, that you can easily implement to ensure a more secure home office network.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Cyber Defense

What to Know About Drive by Downloads

As we’ve learned before, there are many ways hackers can get to your valuable data. From under-the-radar location tracking, to sophisticated in-person and online social engineering and phishing attempts, to full-blown ransomware attacks, and more. Cybercriminals are always on the move to carry out bigger, better, and more impactful attacks to get what they want.

Read More

Topics: Cybersecurity, Social Engineering, Cyber Defense, Ransomware, Cybersecurity Awareness

Business Continuity Through a Pandemic

This year brought about unprecedented changes that no one was prepared for. It served as an important reminder that in the rapidly changing environment, organizations need to be prepared to respond to threats and recover from disruptions so they can continue to thrive.

Read More

Topics: Cybersecurity, Cyber Defense, Cybersecurity Awareness

What to Know about Location Tracking

In today’s world, it can be time consuming to keep up with the current cyberthreat landscape, especially when many organizations do not have dedicated security staff. However, the landscape changes daily, and it’s important to be aware of what’s happening in the digital world that surrounds you.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Mobile Security, Privacy

12 Tips to Defend Against Cyberattacks

The cyberthreat environment changes every day. New malware is developed, new social engineering tactics are deployed, and fraud is seemingly lurking around every corner. Because of the cybersecurity risk that these threats pose, we are all responsible for doing our part to keep information secure at home and at work.

Read More

Topics: Cybersecurity, Social Engineering, Cyber Defense

A Programmatic, Risk-Based Approach

Cybersecurity, as we know it today, is defined as the “the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information,” according to the Cybersecurity & Infrastructure Security Agency. In the 1990s, organizations across the globe started to practice information security to keep data safe. A few years later – as cybercriminals continued to get more sophisticated and organizations had to face the devastating consequences – the idea of cybersecurity over information security evolved.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Cybersecurity Awareness

Cybersecurity Maturity: Tiers and Goals

Achieving cybersecurity maturity is something that organizations should strive to reach over time. Once an organization has a mature cybersecurity program, they will be equipped with the knowledge and power to adapt to the ever-changing threat landscape – a key to becoming a resilient organization. It sounds simple, but gaining cybersecurity maturity is a fluid, never-ending work in progress that should always be improved upon. Let’s dive in.

Read More

Topics: Cybersecurity, Security Policy, Cybersecurity Culture

Meet Our Penetration Testers

At Tyler Cybersecurity, our analysts and consultants are there for organizations like yours every day. Their jobs are to help protect and empower you while sharing their cybersecurity knowledge, so you can be well-informed and armed with necessary tools in the event of an incident.

Read More

Topics: Cybersecurity, Penetration Testing

Network Insight Delivers Peace of Mind

  • Tyler Detect deployed to detect network threats 24/7
  • Malicious behavior found and corrected immediately following deployment
  • Visibility into all network activity is increasing awareness and driving risk mitigation solutions

Tyler Detect has an immediate impact on Lowndes County’s cybersecurity program.

Advanced cyber threat detection cannot happen by algorithm alone. Cybercriminals can evade traditional defenses compromising an infrastructure within minutes or hours. Study after study shows it can take organizations weeks, even months or years, to uncover an intruder.

Read More

Topics: Cybersecurity, Threat Intelligence, Threat Hunting

The Information Security Policy Lifecycle

Regardless of whether a policy is based on guiding principles or regulatory requirements, its success depends in large part upon how the organization approaches the tasks of policy development, publication, adoption, and review. This process is collectively referred to as the policy lifecycle. The responsibilities associated with the policy lifecycle processes are distributed throughout an organization. Organizations that understand the lifecycle and take a structured approach will have a much better chance of success with their cybersecurity practices. Let’s breakdown the Information Security Policy (ISP) lifecycle into further detail.

Read More

Topics: Cybersecurity, Security Policy, Information Security