The Business Vault

What do oil filters have to do with IT?

When I graduated from college, my first job was as an electrical controls designer at an engineering firm.  At about the same ...

Free Cyber Security Checklist

Think fast: what’s the first thing you do after realizing you just replied to the e-mail from the Nigerian prince wanting to give you a sum of $34 million? Okay, you most ...

How to secure your business from the inside in 4 steps

Research has shown that when it comes to cybersecurity in organizations, your people are your greatest risk. (A 2016 IBM study, for example, attributed 60% ...

The 5-minute guide to security assessments: Why, when and how

A security assessment is a periodic review to see how prepared your organization is for a cybersecurity breach. The assessment helps you check for ...

How to create a strong password that’s easy to remember: Tips from an undercover gangster

Back in August 2018, I saw a presentation by bestselling author Chris Mathers at the Cybersecurity Summit in Toronto. Chris speaks from his real-world experience posing ...

How to develop a cybersecurity policy people will actually follow: 7 steps

Every organization needs a cybersecurity policy. It’s the only way people know what’s expected of them, whether we’re talking the COO, the receptionist, a ...

Contact

Birmingham Consulting Inc.Birmingham Consulting Inc. Logo $$$