Maximize your cybersecurity training budget

7/29/2019 by Margaret Teague

With cybersecurity attacks a clear and present danger, you already know the importance of maintaining an expert IT staff to protect your data and electronic assets. At the same time, you probably worry about the cost of ongoing training to keep your IT team one step ahead of the ever-evolving ploys that plague organizations. Now more than ever, you need to make sure you are maximizing educational investments for your business.
Read More »about Maximize your cybersecurity training budget

Should you pay the ransom?

6/24/2019 by Margaret Teague

Learning how to implement, or improve upon, your cybersecurity program utilizing the NIST Cybersecurity Framework will allow you to mitigate risks based on your organization’s needs/goals … and hopefully save your organization from having to choose whether or not to pay a ransom!
Read More »about Should you pay the ransom?

NIST Cybersecurity Framework – A Risk Assessment Process

5/23/2019 by Chris Becher

In partnership with itSM Solutions LLC and UMass Lowell, a NSA/DHS National Center of Academic Excellence in Cyber Defense Research (CAE-R), LRS Education Services is proud to offer the NIST Cybersecurity Professional (NCSP) training curriculum. The curriculum is designed to train how to engineer and implement a cybersecurity program to protect critical assets using the NCSF.
Read More »about NIST Cybersecurity Framework – A Risk Assessment Process

Fun with Kali

4/1/2019 by Troy Stoneking

Admittedly the vast majority of my technical background is on the Windows side. Like many of you I’ve spent years in the field and through training courses improving my Windows skills and gathering a bunch of certifications from Microsoft. Windows is powerful and ubiquitous. I have a great time working in Windows networks and teaching Microsoft courses. But sometimes we all need to broaden our horizons.
Read More »about Fun with Kali

Are You Ready To Assess The State of Your Cybersecurity?

3/25/2019 by Troy Stoneking

We are very proud of our NIST CSF courses. The reviews have been fantastic! Many organizations take that knowledge and create or improve a cybersecurity program on their own. In the Bootcamp/Practitioner classes we get very specific as to what that program could contain and how it might be organized. However, we’ve heard from clients that they want more. They need a partner to come alongside and help them through the process of discovering exactly where they are in cybersecurity. What’s going well, what are the gaps and what should be done to close them?
Read More »about Are You Ready To Assess The State of Your Cybersecurity?

The End of Antivirus?

1/3/2019 by Troy Stoneking

A few weeks ago I was speaking to a client about the need for antivirus as called for in the Payment Card Industry Data Security standards (PCIDSS) Requirement 5: Protect all systems against malware and regularly update antivirus software or programs. He made an unusual statement, “We don’t use antivirus.” Having been in IT and cybersecurity for many years I knew this was eventually coming, but it was the first time I’d seen it in a real-world implementation. Here are some facts:
Read More »about The End of Antivirus?

Security+ is Important TODAY!

11/20/2018 by Karen Gill

It doesn’t matter if you are at a small business or a very large company, cybersecurity is more important today than it has ever been! As we move into the holiday season, retail cybersecurity is dominating our attention, but any company involved in digital transformation continues to lack the workforce needed to protect assets.
Read More »about Security+ is Important TODAY!

Can't You Trust Anyone Anymore?

9/4/2018 by Troy Stoneking

When I’m working with a client and the topic of cybersecurity arises they want to talk about attacks from Russia, North Korea or various organized crime entities. But did you know that these types of threats are not the most likely avenue from which you’ll have a breach in your cybersecurity? In fact they are WAY down the list of who’ll be the reason your security is compromised. Want to know the greatest threat?
Read More »about Can't You Trust Anyone Anymore?

 Previous 1 2 Next     1 2 10