I talked about "strengthening human awareness cannot be overlooked". The easiest penetration into a corporate network is via phishing email.
When we deploy control, we must understand what is the purpose of the control. I came across certain cybersecurity practitioners
A path is required at the barrier or perimeter for a number of reasons: reachability to/from destination with legitimate needs
The "Exit" has demonstrated various types of control to secure the physical perimeter while enable a "kill switch" to emergency
We always hear people telling everything is now in the Cloud. Precisely, this is somehow incorrect. Even though there are
One of the key controls in cyber world is the ingress/egress points to the network. Without sufficient control, threat actors
I saw some awareness posters that cyber security is a shared responsibility. No doubt each of us plays a different
In the illustration, there is implicit EXCEPT WITH PERMIT in real life. However, the bilingual "except's" are inconsistent.The Chinese version
This is seasonal - only happened a short while during winter time when lake or river is frozen with thickness
In pandemic disease era, facemask is a effective means to protect being infected via airborne transmission. This is usually voluntary
Earlier, I talked about similar. When conducting a comprehensive assessment of a facility, we should not just look at the
Policies are rules. They stipulate what are allowed and what not. Good policies must be practically achievable and enforceable, not