
BARR Advisory has teamed up with a cohort of partners and clients to provide teachers, parents, and students with a comprehensive resource for starting thoughtful conversations about cybersecurity and internet…
BARR Advisory has teamed up with a cohort of partners and clients to provide teachers, parents, and students with a comprehensive resource for starting thoughtful conversations about cybersecurity and internet…
Digital cleaning is a great way to strengthen and improve your cyber hygiene. Security risks have evolved over time and will continue to do so, which means ensuring your security…
As Mother’s Day approaches, we take time to reflect on all of the things mothers, and all caregivers, do to ensure the safety and security of their children. From the…
Sometimes cybersecurity can feel a lot like a game of chess. Both center around your most valuable asset—in chess it’s the king, in cybersecurity it’s the data. And just when…
By: Julie Mungai, Cyber Risk Advisory manager Browsers are the gateway to the internet. All the data that we want comes through them and all the data we provide goes…
Vulnerability scans and penetration tests—they sound similar, right? Some use them interchangeably, but the truth is these terms are quite different when it comes to how they are carried out,…
Spring is finally here! As the days begin to warm up and flowers start to bloom, plenty of people are preparing for an annual deep clean of their space. While…
Monday marks the beginning of Data Privacy Week! Led by the National Cybersecurity Alliance, the goal of this week is to educate and empower both individuals and organizations to respect…
News of a widespread security exploit within the Log4j internet software (also called Log4shell) sent IT and security teams into emergency mode earlier this week. With lots of information swirling…