What is a vCISO?

What is a vCISO?

A virtual chief information security officer (vCISO) is a third-party cybersecurity expert who provides organizations with strategic advice and guidance on information security matters. Typically there are one of three reasons to hire a vCISO:  Your company’s...
Welcome to TrustedCISO a vCISO Consulting Company

Welcome to TrustedCISO a vCISO Consulting Company

Hello and welcome to TrustedCISO! I have 30 years of experience in information security. Having been a Chief Information Security Officer (CISO) at RedSeal, Inc, I decided to launch my own vCISO consulting company in 2022. I am experienced in building SOC2 and...
Election Security and Telecommunications Breaches

Election Security and Telecommunications Breaches

In today’s complex digital landscape, cybersecurity threats are not just a corporate problem—they’re a matter of national security. This week, significant news surrounding two major cyber issues demands attention: a breach of U.S. telecommunications...
Manage Multiple Emails in Outlook

Manage Multiple Emails in Outlook

Did you know you can manage multiple emails by using Outlook?  As a Virtual Chief Information Security Officer (vCISO), I work with multiple customers on a fractional basis.  I end up having multiple emails. I order to make these manageable I add them to Outlook. This...
CISA Secure Small Businesses: Essential Guide

CISA Secure Small Businesses: Essential Guide

🌐💡 The staggering rise of #Cybercrime costs is a wake-up call for us all. According to Cybercrime Magazine, these costs are expected to grow by 15% per year, reaching a mind-boggling $10.5 trillion annually by 2025. 📈 #SmallBusinesses, in particular, are prime targets...
United Healthcare Ransomware Attack

United Healthcare Ransomware Attack

After a debilitating ransomware attack at United Healthcare that has caused some health care providers to lose up to $1 billion a day, the US Office of Health and Human Resources is investigating the hack.  United Healthcare paid $22 million to the Russian ransomware...
Ransomware Attack

Ransomware Attack

Holiday Inn Ransomware Attack One thing is for sure, you don’t want to be a victim of ransomware. Almost daily, there is another breach and ransomware was deployed as part of the hack. For instance, the Holiday Inn or IHG hack is another example of not being...
Securing Cloud Serverless

Securing Cloud Serverless

Here are the best practices for securing cloud serverless architecture: Implement proper access controls: Use identity and access management (IAM) to set up fine-grained permissions for resources and APIs. Secure data in transit and at rest: Encrypt sensitive data and...