Author: Grant Gilliam

I’ve been ransomed, what do I do now?

Several have probably seen that the town I live in (Durant, OK) has been hit by ransomware. Many of you may be wondering: what do you do if you are hit with ransomware? Let’s walk through a few steps on what to do. First, isolate the ransomware in your environment quickly! Immediately disconnect the infected…

Home Weakness, Business Risk: How Poor Cybersecurity at Home Can Compromise Your Organization

In today’s hybrid and remote work environments, the boundary between personal and professional digital spaces is virtually gone. Employees access sensitive business data from home networks, personal devices, and even public Wi-Fi, often without realizing the significant risks involved. While organizations have made strides in strengthening enterprise security, many overlook one of their most vulnerable attack…

Why NIST Cybersecurity Framework 2.0 Should Be at the Core of Your Cybersecurity Strategy

Cyber threats continue to grow in scale and sophistication and so must the frameworks we use to combat them. In response to this evolving landscape, the National Institute of Standards and Technology (NIST) released an updated version of its landmark guidance: the NIST Cybersecurity Framework 2.0. Whether you’re a small business, a government contractor, or a global enterprise,…

Cybersecurity in Crisis: Why Natural Disasters Demand Digital Vigilance

When natural disasters strike, such as tornadoes, hurricanes, wildfires, floods, and earthquakes, the immediate focus is understandably on physical safety, emergency response, and restoring basic services. However, amid the chaos and disruption, another invisible threat often goes overlooked: cybersecurity. Disasters create ideal conditions for cybercriminals. Networks are disrupted. Communication channels are stressed. Emergency systems may…

The Importance of Information Security in SaaS: Why It Matters More Than Ever

In the digital age, Software as a Service (SaaS) has revolutionized how businesses operate. From CRM systems to project management tools and accounting software, SaaS applications provide agility, scalability, and cost-efficiency. However, as convenience increases, so do the risks, particularly around information security. What Is Information Security in SaaS? Information security refers to the practices…