Resources

HAVE I BEEN PWND?

Enter your email address (work and home) and find out if it has been a part of a data breach. Does not contain data on all breaches worldwide, but it has a lot of them. Set it up so that you’ll automatically be notified if your address appears in a future breach. You can also arrange for all addresses in your company domain (@yourfirm.com) to receive the same notification.

LEARN MORE  

REPORT SPAM

The U.S. Federal Trade Commission wants to hear from you if you’ve received a spam email. Your ISP should filter most of it, but anything that gets through is probably more dangerous than you might think. Forward the spam email to the Federal Trade Commission at spam@uce.gov. Be sure to include the complete spam email.

LEARN MORE 

NO MORE RANSOM!

In some cases, keys to decrypt encrypted files are available. Find out if you’re one of the lucky ones by visiting No More Ransom!

 

CYBRARY

Cybrary is a great resource for a wide range of cybersecurity training, and best of all: free.

LEARN MORE 

HABITU8

Habitu8 helps companies build effective security awareness programs though their unique, engaging, and entertaining training videos. I’ve been through some terrible security training in my time, and I only wish they had Habitu8 back when I started.

LEARN MORE 

ELEVATE SECURITY

Once you’ve got the awareness situation addressed, Elevate Security works on changing the behavior of your employees by exposing them to how hackers think, giving them a new perspective on what they should do, how and why they should you do it, and how it all comes together from a security perspective.

LEARN MORE 

THREAT MODELING THURSDAYS

Threat modeling is how you figure out what’s important to you and what you worry about the most. Key factors in building a sound cybersecurity program. Adam is a world-renowned expert who literally wrote the book on how to threat model.

LEARN MORE 

TWO-FACTOR AUTHENTICATION: DUO SECURITY

A commercial product that is well done, highly regarded, and not terribly expensive (free up to 10 users).

LEARN MORE 

TWO-FACTOR AUTHENTICATION: YUBIKEY

If you’re really taking this 2FA thing seriously, and don’t want to use personal cell phones for receiving factors, Yubikey is a very small and easy to use hardware-based solution. It is more expensive than Duo and requires a little more management on the part of your IT people.

LEARN MORE

BACKUPS: BACKBLAZE

LEARN MORE 

BACKUPS: CARBONITE

LEARN MORE 

FULL DISK ENCRYPTION: WINDOWS 10

WINDOWS 10 DIRECTIONS 

FULL DISK ENCRYPTION: WINDOWS 7 AND OTHER VERSIONS

OTHER WINDOWS DIRECTIONS 

FULL DISK ENCRYPTION: APPLE OS X

APPLE OS X DIRECTIONS 

FULL DISK ENCRYPTION: THIRD-PARTY OPTIONS