Don’t get Lured by Phishing Schemes
We’ve seen a huge rise in successful phishing schemes in the first quarter of 2023, and the ways attackers successfully pull these off have become much more sophisticated. Click here to learn more about different types of traps and how to prevent yourself from being compromised!
Communication methods and options for enterprises
It’s tough to keep up with the times on what’s considered acceptable when engaging in digital communications about work related items. We’ve laid out our best practices for effectively communicating across your enterprise without creating threads of risk exposure to your company.
Nevada Privacy Law: Requirements, Scope, and Impact on Companies
Check out our fast facts on the Nevada Privacy Law requirements, and our advice on operationalizing controls within your technology environment to meet those!
Cloud IAM: a primer
Identity and access management is a fundamental part of a successful cloud environment. Learn the basic things you need to know here!
"Building a Better Bastion: The Art of Ephemeral Host Creation"
We are always excited when we start assessments with customers who have reached a maturity state leveraging Bastions and JumpBoxes, but often these security measures themselves can become a weak link of replicated data or code. Check out this great post and white paper by Digital Minion contributor Skip Cruse innovator of the “Ephemeral Host”.
Don’t be fooled; MX records aren’t the last step
Email records are some of the most vulnerable forms of communication that can expose a company to risk. Learn how to protect these easily compromised assets here:
What is Kerberos
Kerberos is a widely-industry standard authentication method that can help you secure your systems. Learn more here:
The Most Important Conversation We Have With Customers
One of the most important first conversations we have with our Big Data customers is about how to truly lock down identity controls in any environment, here's why.
Don’t sleep on your IAM Policies
Fine-grained AWS IAM policies are crucial for securing your cloud environment and ensuring that your organization adheres to security best practices. Click here to learn more!
The Growing Importance of Managed Encryption
Encryption is a key component of securing your infrastructure, and now’s the perfect time to dig into your controls and make sure you’re happy with your security posture. Click here to learn more: