Gray Beard Blog

Random Thoughts....

catscan-test-scenerios

2 min read

Blog Archives

Published in Information Security Buzz Scrutiny over data protection and privacy, and the reporting and analysis behind a powerful threat defense, is moving to the boardroom as organizations are seeing the need to take a closer look at just how...

Read More

12 min read

One Hundred Sixty Nine Questions About Your Security Program

Commercially Reasonable Cyber Security in 169 Questions - By Tom Brennan Mature organizations want to manage to "best practice" so that they can be...

Read More

7 min read

Scan Exchange Log Files for Indicators of Compromise

If your organization runs an OWA server exposed to the internet, assume compromise between 02/26-03/03. Check for 8 character aspx files in...

Read More

2 min read

Blog Archives

I was asked to write a basic information security policy for my veterinarian office who is concerned about basic business hygiene came out pretty...

Read More

2 min read

Are You Proactive?

Cybersecurity is a critical concern for businesses of all sizes and industries. With the increasing reliance on technology, businesses have become...

Read More

1 min read

Blog Archives

In looking across the 2023 business reviews we have seen some strenths and some common weaknesses such as 1. Strengths Advanced IT Infrastructure:...

Read More

1 min read

FREE CONSULTING

I received a call this week from a fortune 500 business, they organization had a problem and wanted to do a meeting related to cyber security...

Read More

1 min read

SONICWALL FIREWALL BEST PRACTICES

A SonicWall firewall can be configured for optimum security by following these best practices: Enable the SonicWall Security Services: Enable the...

Read More

1 min read

Blog Archives

I received a call this week from a fortune 500 business, they organization had a problem and wanted to do a meeting related to cyber security...

Read More

2 min read

​THE BUSINESS VALUE OF CYBER RESILIENCE

Published in Information Security Buzz Scrutiny over data protection and privacy, and the reporting and analysis behind a powerful threat defense, is...

Read More