
As Mother’s Day approaches, we take time to reflect on all of the things mothers, and all caregivers, do to ensure the safety and security of their children. From the…
As Mother’s Day approaches, we take time to reflect on all of the things mothers, and all caregivers, do to ensure the safety and security of their children. From the…
Sometimes cybersecurity can feel a lot like a game of chess. Both center around your most valuable asset—in chess it’s the king, in cybersecurity it’s the data. And just when…
By: Julie Mungai, Cyber Risk Advisory manager Browsers are the gateway to the internet. All the data that we want comes through them and all the data we provide goes…
Vulnerability scans and penetration tests—they sound similar, right? Some use them interchangeably, but the truth is these terms are quite different when it comes to how they are carried out,…
Spring is finally here! As the days begin to warm up and flowers start to bloom, plenty of people are preparing for an annual deep clean of their space. While…
Monday marks the beginning of Data Privacy Week! Led by the National Cybersecurity Alliance, the goal of this week is to educate and empower both individuals and organizations to respect…
News of a widespread security exploit within the Log4j internet software (also called Log4shell) sent IT and security teams into emergency mode earlier this week. With lots of information swirling…
REGISTER NOW BARR Advisory President and Founder Brad Thies, CISA, CPA, and Senior Consultant Larry Kinkaid, CISA, CRISC, are partnering with Nick Santora, CISA, CISSP, CEO of Curricula, and Chris…
With the Center for Internet Security (CIS) recently releasing version eight of its controls, consolidating the previous 20 controls into 18, let’s dive into the final set of six controls…