google-site-verification: google25bcd6d793c28372.html

Reduce Cyber Risk

- Blog -

 
Wi-Fi Hopping And Database Defense for Businesses Feb 26, 2026

REMOVE 310

Check us out at:  https://www.cisspcybertraining.com/

Get access to 360 FREE CISSP Questions:  https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout

Get access to my FREE CISSP Self-Study Essentials Videos:  https://www.cisspcybertraining.com/offers/KzBKKouv

A neighboring Wi-Fi network, a handful of stolen credentials, and a quiet lateral move into a high-value environment — t...

Continue Reading...
 
Scripted Sparrow BEC and Incident Response Feb 23, 2026

REMOVE 308

Check us out at:  https://www.cisspcybertraining.com/

Get access to 360 FREE CISSP Questions:  https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout

Get access to my FREE CISSP Self-Study Essentials Videos:  https://www.cisspcybertraining.com/offers/KzBKKouv

Here's the rewritten description:


A single convincing email can redirect a wire transfer, and the crews executing the...

Continue Reading...
 
Legal, Regulatory, and Compliance Requirements for Cybersecurity Feb 19, 2026

REMOVE 306

Check us out at:  https://www.cisspcybertraining.com/

Get access to 360 FREE CISSP Questions:  https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout

Get access to my FREE CISSP Self-Study Essentials Videos:  https://www.cisspcybertraining.com/offers/KzBKKouv

Security programs that operate in isolation from business operations don't fail dramatically — they just slowly lose rel...

Continue Reading...
 
Understanding Software Development Security Feb 16, 2026

Check us out at:  https://www.cisspcybertraining.com/

Get access to 360 FREE CISSP Questions:  https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout

Get access to my FREE CISSP Self-Study Essentials Videos:  https://www.cisspcybertraining.com/offers/KzBKKouv

A disgruntled insider with lingering access flipped Disney restaurant menus to Wingdings font and tampered with allergy labels — a v...

Continue Reading...
 
Understanding Security Audits and how they work in Cybersecurity Feb 12, 2026

REMOVE 302

Check us out at:  https://www.cisspcybertraining.com/

Get access to 360 FREE CISSP Questions:  https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout

Get access to my FREE CISSP Self-Study Essentials Videos:  https://www.cisspcybertraining.com/offers/KzBKKouv


If security audits feel like an endless cycle of paperwork with little to show for it, this episode reframes the entir...

Continue Reading...
 
Failing Securely, Simply, Separation of Duties, KISS and Zero Trust (CISSP) Feb 09, 2026

Check us out at:  https://www.cisspcybertraining.com/

Get access to 360 FREE CISSP Questions:  https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout

Get access to my FREE CISSP Self-Study Essentials Videos:  https://www.cisspcybertraining.com/offers/KzBKKouv

Security programs don't fail because of bad intentions — they fail because teams try to tackle everything simultaneously and end up ...

Continue Reading...
 
Security and Gap Assessments for SMBs Feb 05, 2026

 A single phish can take down an entire business, and too many small teams only discover that truth after it’s too late. We unpack how security and gap assessments give SMBs a clear, practical path to defend revenue, earn trust, and meet compliance without chasing shiny tools or boiling the ocean.

We start with a cautionary tale: a young intruder reused stolen credentials, posted proof online, and ...

Continue Reading...
 
Small and Medium Business the Prime Target for Cyber Criminals Feb 02, 2026

Small businesses don't fly under the radar — they're the target. Attackers aren't choosing victims based on prestige; they're choosing based on ease, speed, and return. In this episode, Shon dismantles the "we're too small to matter" assumption and replaces it with a clear-eyed look at the economics driving modern cybercrime, and why SMBs sit squarely in the crosshairs.

We walk through the specif...

Continue Reading...

Secure Your Business Today!

Get a Cyber Security Assessment Guide with focused questions to help you understand your organization's cyber security risk.  

Get A Copy Now!