top of page


Personal Information Security For Business Leaders - Part 1
The risk to small and medium enterprises (SMEs) has been rising lately. Executives’ personal information, accounts, and technology provide a lucrative and often overlooked target.

Susan Sons
Nov 126 min read
Â
Â


Exploiting Human Nature: The Oldest Vulnerability in Cybersecurity
People assume good intent until proven otherwise. The same instinct that builds teams and partnerships also allows adversaries to impersonate them.

Renata Glebocki
Oct 295 min read
Â
Â


Compliance Is Not Security: When Governance, Risk, and Compliance Fail to Protect
In cybersecurity, compliance is often mistaken for protection. Unfortunately, that decision trades measurable comfort for invisible risk.
Andrew Kirch
Oct 216 min read
Â
Â


Securing the Weird at Bsides Bloomington
Telescope facilities on Mauna Kea in Hawaii I enjoyed presenting Securing the Weird at Bsides Bloomington 2025. Slides are below for...

Susan Sons
Oct 141 min read
Â
Â
Stakeholder Management In a Crisis at Bsides Bloomington
I recently had the pleasure of presenting Stakeholder Management In a Crisis: Lessons From a Crisis Communicator at Bsides Bloomington ....

Susan Sons
Oct 71 min read
Â
Â


Your Security Is Only as Strong as Your Weakest Supplier
In this blog articles we explore the cybersecurity risks that exist outside your direct control.
Andrew Kirch
Sep 284 min read
Â
Â


SaaS vs On-Prem: Cybersecurity Risks to Continuity, Integrity, and Access
Many organizations rely on SaaS platforms instead of traditional on-premises solutions, trading control for convenience. The risks of that trade-off are often misunderstood.
Andrew Kirch
Sep 234 min read
Â
Â


Executive Missteps: Fire Drill Down Below
This is the fourth installment in an ongoing series called "Executive Missteps" on how business leaders, often unknowingly, sabotage their organization's cybersecurity...and how not to be that person. Each is inspired by a true story (or several). Find previous installments here: Above the Law (1) , Shadow (IT) Man (2) , On Deadly Ground (3) . Avery (not his real name) is busy, like most CEOs. His company is a regional powerhouse in the process of building out a handful of

Susan Sons
Sep 164 min read
Â
Â


Failure Is Like Onions: Physical Security Lessons for Your Server Room
Stop me if you have heard this before. A company suffers a massive IT outage. The culprit is not a hacker in a foreign country or a sophisticated piece of malware. It is an unlocked door.
Andrew Kirch
Sep 75 min read
Â
Â


Executive Missteps: On Deadly Ground
This is the third installment in an ongoing series called "Executive Missteps" on how business leaders, often unknowingly, sabotage their organization's cybersecurity...and how not to be that person. Each is inspired by a true story (or several). Find the first installment here , and the second here . Cybersecurity risks brought in by M&A can leave an executive feeling like the ground is falling out from under them. It's been a busy month for our CEO as the company works on w

Susan Sons
Sep 25 min read
Â
Â


The Pitfalls of Cybersecurity Insurance and how your small business can avoid them
Most companies don’t realize how narrow and conditional cybersecurity insurance coverage really is until they need it.
Andrew Kirch
Aug 273 min read
Â
Â


Five Lies About Software Security
Managers, project managers, and executives can increase code quality by improving the environment and incentives for development teams.... and that includes improving security.

Susan Sons
Aug 194 min read
Â
Â


How to Avoid Being the Weak Link as a New Developer
Starting your first job as a software developer is both exciting and intimidating. You want to make a strong impression, but you may worry about making a mistake that harms the company.
Andrew Kirch
Aug 134 min read
Â
Â
Executive Missteps: Shadow (IT) Man
This is the second installment in an ongoing series called "Executive Missteps" on how business leaders, often unknowingly, sabotage their organization's cybersecurity...and how not to be that person. Each is inspired by a true story (or several). Find the first installment here . It's a normal Wednesday morning when the SOC (Security Operations Center) manager gets a knock on her door. One of her analysts has learned that the company's mail server has appeared on major bla

Susan Sons
Aug 53 min read
Â
Â


There Is No Magic Cybersecurity Box
"Any sufficiently advanced technology is indistinguishable from magic." — Arthur C. Clarke’s Third Law The magic cybersecurity box, as...
Andrew Kirch
Jul 293 min read
Â
Â


Executive Missteps: Above the Law
It's late on Friday afternoon, and the corporate help desk gets a phone call. The CEO is in a panic. His next move will cost the company dearly.

Susan Sons
Jul 224 min read
Â
Â


A Practical Guide to Ransomware recovery (without paying) and Data Loss Prevention
Protecting your business from ransomware and blackmail requires a disciplined backup and data loss prevention strategy.
Andrew Kirch
Jul 155 min read
Â
Â


What is Cybersecurity for the Small to Medium size Organization?
Small to Medium size Organizations, or commonly SME's face unique cybersecurity challenges now, and in the future. Here. Susan Sons explains the strategy for facing those challenges head-on.

Susan Sons
Jul 14 min read
Â
Â


Stop Repeating Yourself – Automate It
Eliminating repetitive tasks, enforcing configuration consistency, and automating provisioning aren’t just technical wins, they’re operational leverage. Automation doesn’t mean less work. It means less waste and more time for what actually matters.Â
Andrew Kirch
Jul 14 min read
Â
Â


A Primer On Strategy for Technicians
Having at least a basic understanding of strategy, especially since most people in your position don’t, can be a massive career accelerator for an individual contributor. This is especially true in IT, because our technological systems influence the behavior of the organization and sometimes of its customers. Â

Susan Sons
Jun 247 min read
Â
Â
bottom of page


