Skip links

Keys to Better User Training

It is widely documented that users are the biggest vulnerability in our cybersecurity ecosystem.  Technical solutions and policy are all foundational and necessary, but a single careless user or a deliberate shadow IT practitioner can easily expose the business to serious threats.  As a result, companies

A Director’s Guide to Cybersecurity “Certification”

Boards get it, they need to exercise the same level of oversight regarding cybersecurity as they do with financial statements.  The difference is there is a well-developed set of standards governing financial accounting with associated audits and examinations.  The standards are not as well defined