Principle Logic Logo
  • Home
  • About
  • Services
  • Resources
  • Blog
  • Contact

Kevin Beaver's Security Blog

  • Security awareness/training and security policy tips for tough times

    15 Apr 2020

    It’s a tired subject at this point. Still, I still wanted to share some pieces that I’ve written on security awareness/training and security policies over the years that your business might benefit from to help get (keep) your arms around your remote workforce and overall information security program…no need to buy anything or hire anyone to help. The following are all you need to get rolling and/or fine-tune:

    Security Awareness and Training

    • Defining Your Overarching Goal for Email Phishing Testing
    • How IT professionals undermine their own email phishing campaigns
    • The politics of email phishing
    • How to create a sample phishing campaign
    • Smishing targets mobile users and IT must prepare to fight it
    • How does phishing apply to mobile devices
    • Creating an email phishing testing program for your users
    • What desktop admins can do about email phishing
    • An easy way to help protect against email phishing
    • Minimize your online footprint to combat phishing
    • What to include in an Exchange Server phishing test
    • Throw users a line to thwart an email phishing attack
    • Stop attackers from catching you in a phishing hack
    • Top gotchas when performing email phishing tests
    • The fallacy of information security awareness and training
    • Social Engineering: The big risk no one’s thinking about

    Security Policies

    • Why you have to look past security policies for real improvements
    • Best practice tips for your password policy
    • Why you have to move beyond “We have a policy for that”
    • Security’s gaping hole – policy enforcement
    • Sample e-mail policy template and checklist of concerns
    • Quick policy checklist
    • Why you have to look past security policies for real improvements
    • Five Reasons Your Employees Are Violating Your Security Policies
    • When security policies are bad for business
    • Security policies don’t get hacked. Why do they get all the attention?

Resources

  • My books
  • My blogs and columns
  • My articles, podcasts, and webcasts
  • My downloadable book chapters
  • My currently-published whitepapers and guides

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)
Read More

 

I’ve written/co-written 12 books on information security including:

 

Tags

AI appsec basics books Career Networking careers censorship cervical instability CISO CISSP cities coronavirus covid-19 cybersecurity data breaches eagle syndrome hacking Hacking For Dummies heads in sand health helmet communications incident response information risk keynote speaker leadership macOS NCAA football networking passwords Power Four rare diseases resilience Russian hacking security culture security leadership security speaker social engineering speaking engagements sql injection tethered spinal cord tiktok time management vulnerability and penetration testing web security zero-based thinking

© Copyright 2001-present, Principle Logic, LLC - All Rights Reserved.

  • Home
  • About
  • Services
  • Resources
  • Blog
  • Contact