Rj WilliamsSecure your Microsoft 365 account with Multi-Factor AuthenticationAre you concerned about the security of your Microsoft 365 account? As cyber threats become increasingly sophisticated, it’s more important…Feb 15, 2023Feb 15, 2023
Rj WilliamsISO 27001 or NIST 800–171aLately, I have recommended that organizations build a cybersecurity program on ISO 27001 rather than laser focusing on a NIST 800–171-like…Dec 30, 2022Dec 30, 2022
Rj Williams5 ways to avoid Remote IT BurnoutWorking in a remote IT job can be rewarding and fulfilling, but it can also be challenging and can lead to burnout if you are not careful…Dec 30, 2022Dec 30, 2022
Rj Williams4 things you don’t expect that come with being a Cybersecurity AnalystCongratulations on your new job as a cybersecurity analyst! You have worked hard to earn your degree and have finally landed the position…Dec 30, 2022Dec 30, 2022
Rj WilliamsWrite a Network Security Policy that works for you…A network security policy is a document that outlines the measures that an organization takes to protect its computer networks and systems…Dec 30, 2022Dec 30, 2022
Rj WilliamsKnock Knock, What's the Password?A password policy is a document that outlines the requirements for creating and managing passwords within an organization. It is an…Dec 30, 2022Dec 30, 2022
Rj WilliamsIncident Response Policies that work — Write an IRP in 1–2–3 (4–5)A security incident response policy is a document that outlines the steps an organization takes in the event of a security incident, such…Dec 30, 2022Dec 30, 2022
Rj WilliamsProtect the Data @ All Costs — Write the Policy TODAY in 5 Easy Steps!A data protection policy is a document that outlines the measures that an organization takes to protect sensitive data, including customer…Dec 30, 2022Dec 30, 2022
Rj Williams5 Steps to a stellar AUP, 1 step closer to compliance!An acceptable use policy (AUP) is a document that outlines the acceptable ways in which employees can use company resources, including…Dec 30, 2022Dec 30, 2022
Rj WilliamsThe Top 5 Cybersecurity Policies: Write them today (HINT: I will write them for you in this series)As a cybersecurity professional, I know firsthand the importance of having strong policies in place to protect an organization from cyber…Dec 30, 2022Dec 30, 2022