How Culture & Technology Work Together to Strengthen Cybersecurity
by Jake Dwares on October 14, 2025 at 3:15 PM
In cybersecurity, it is easy to get caught up in the excitement of new technology. Every year, new tools promise sharper visibility, faster detection, and tighter control over threats. Organizations invest heavily in endpoint protection, firewalls, SIEM platforms, and automation syste …
Understanding DoD Impact Levels for Cloud Security
by Jake Dwares on January 15, 2025 at 12:59 PM
The security of information is a cornerstone of the Department of Defense's (DoD) operations. To safeguard sensitive data, the DoD has developed Impact Levels (ILs), a framework that categorizes information systems based on their sensitivity and the potential impact of a compromise. T …
What Is a Disaster Recovery Team in Cybersecurity?
by Jake Dwares on December 24, 2024 at 2:00 PM
In today's interconnected and technology-driven world, businesses rely heavily on their IT systems to maintain operations, store critical data, and serve customers effectively. However, the increasing sophistication of cyber threats and potential for unexpected disruptions demand proa …
Almost Fooled by a Lululemon “Sale”: A Dad’s Lesson on Online Scams
by Jake Dwares on November 8, 2024 at 10:09 AM
In the world of cybersecurity, we talk about vigilance and verifying links all day long. As a cybersecurity auditor, I focus on Payment Card Industry Data Security Standards (PCI DSS) and often find myself reminding clients and colleagues about the importance of secure online practice …
Phishing vs. Pharming: What's the Difference?
by Jake Dwares on May 29, 2024 at 4:43 PM
Online security is a prime concern for individuals and organizations alike with cyber threats and scams targeting users often. Two prevalent cyber threats, phishing, and pharming, pose significant risks to users by attempting to deceive them into revealing sensitive information. Altho …
What Is Ethical Hacking? A Comprehensive Guide
by Jake Dwares on April 2, 2024 at 1:45 PM
In today’s world, the pervasive threat of cyberattacks has illuminated a stark reality: no computer system is entirely immune to intrusion. This challenge has paradoxically ushered in the role of ethical hackers — cybersecurity professionals who employ their skills to fortify defenses …
.webp?width=2169&height=526&name=Compass%20regular%20transparent%20website%20(1).webp)
-1.webp?width=2169&height=620&name=Compass%20regular%20transparent%20website%20smaller%20(1)-1.webp)





