Sage Advice - Cybersecurity Blog

What to Know about Location Tracking

In today’s world, it can be time consuming to keep up with the current cyberthreat landscape, especially when many organizations do not have dedicated security staff. However, the landscape changes daily, and it’s important to be aware of what’s happening in the digital world that surrounds you.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Mobile Security, Privacy

Why You Need Strong Passwords

Passwords are essential to keep both your professional and personal information protected. With nearly all business being conducted online and many of us working remotely, we all have multiple accounts to manage. Strong, unique passwords are a great defense against hackers.

Read More

Topics: Cybersecurity Tips, Cyber Defense, Cybersecurity Awareness, Penetration Testing

A Programmatic, Risk-Based Approach

Cybersecurity, as we know it today, is defined as the “the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information,” according to the Cybersecurity & Infrastructure Security Agency. In the 1990s, organizations across the globe started to practice information security to keep data safe. A few years later – as cybercriminals continued to get more sophisticated and organizations had to face the devastating consequences – the idea of cybersecurity over information security evolved.

Read More

Topics: Cybersecurity, Cybersecurity Tips, Cybersecurity Awareness

What Makes a Strong Password?

Between personal accounts and work accounts, the sheer number of credentials and passwords that we have to manage can be overwhelming and inconvenient – especially if we forget them. While managing passwords may be a pain, it’s necessary if we want to protect our personal information. After all, cybersecurity is everyone’s responsibility. 

Read More

Topics: Cybersecurity Tips, Cybersecurity Awareness

How to Start Developing Your ISP

The role of policy is to codify guiding principles, shape and require behavior, provide guidance to those who are tasked with making present and future decisions, and serve as an implementation roadmap. An information security policy (ISP) is a directive that:

Read More

Topics: Cybersecurity Tips, Regulations, Information Security

Cyber Liability Insurance Explained

With the number of cyberattacks occurring today, it’s especially important for companies to be knowledgeable when it comes to cybersecurity best practices, how to create and nurture cybersecurity culture, and how to hunt for threats on the network. But no organization – large or small, public or private – is immune to a data breach, even with appropriate security measures in place.

Read More

Topics: Cybersecurity, Cybersecurity Tips