Article3, Cybersecurity Hayley Ravotti Article3, Cybersecurity Hayley Ravotti

What is DomainKeys Identified Mail (DKIM)?

DKIM, DomainKeys Identified Mail, is used to authenticate an email. It uses a digital signature to let the email recipient know the message and content of the email was authorized by the domain owner. How does DKIM work? Actually it's fairly complicated in terms of generating public and private keys in order to verify the content of your email.

Read More
Article3, Cybersecurity Hayley Ravotti Article3, Cybersecurity Hayley Ravotti

What is SPF and How Does IT Work?

Sender Policy Framework (SPF) is an email authentication protocol designed to prevent email spoofing and spam. It restricts who can use an organization's domain as the sender of the email. In most phishing attacks, threat actors usually spoof the sender's email address to look official. SPF prevents that from being received.

Read More
Article3, Cybersecurity Hayley Ravotti Article3, Cybersecurity Hayley Ravotti

What is DMARC? Geeky Edition!

DMARC, Domain-based Message Authentication, Reporting & Conformance, is an email security protocol that verifies email senders by building on the DNS services and the SPF, and DKIM protocols. It was created to block the threat of email spoofing, domain spoofing, email phishing, business email compromise, and other email-based attacks.

Read More
Article3, Cybersecurity Alex Kovach Article3, Cybersecurity Alex Kovach

What You Need To Know About Insider Threats

An insider threat refers to the risk or potential harm posed to an organization's data, systems, or security by individuals who have authorized access to the organization's resources. These individuals could be current/ former employees, contractors, or business partners who possess knowledge, privileges, and/or access rights within the organization's systems and networks.

Read More
Article3, Cybersecurity Adam Evans, CISSP Article3, Cybersecurity Adam Evans, CISSP

Does Your Company Need a CISO?

In today's digital age, data security has become a top priority for organizations across industries. With the increasing frequency and sophistication of cyber-attacks, it's critical for businesses to have a dedicated professional responsible for their overall information security.

Read More
Article2, Cybersecurity Adam Evans, CISSP Article2, Cybersecurity Adam Evans, CISSP

What are SIEM and SOAR?

SIEM, or Security Information and Event Management, is a platform that collects and stores all the logs from various sources, including firewalls, servers, endpoints, and cloud platforms, in one centralized location. This allows security teams to monitor and analyze all the logs in one place, making it easier to detect any anomalies or potential security breaches.

Read More
Cybersecurity, Article2 Adam Evans, CISSP Cybersecurity, Article2 Adam Evans, CISSP

Why Should You Have Cyber Insurance?

In today's digital age, businesses and individuals face a growing threat of cyber-attacks, data breaches, and other types of cyber incidents. These incidents can cause significant financial and reputational harm to those affected. Cyber insurance is a type of insurance designed to protect against these risks.

Read More