Why the U.S. Router Ban Makes Sense from a Cybersecurity Perspective

Why the U.S. Router Ban Makes Sense from a Cybersecurity Perspective The U.S. government has taken a stronger position against foreign-made consumer routers, and from a cybersecurity perspective, I understand why. According to Reuters, the FCC announced in March 2026 that it was banning the import of new foreign-made consumer routers, citing national security and cybersecurity concerns. The FCC’s public notice added routers produced in foreign countries to the FCC Covered List unless a specific router or class of routers receives conditional approval from the Department of War or the...

Physical Security Assessments

Physical Security Frameworks for Data Centers: ISO 27001 vs TIA-942 vs BICSI 002 When people talk about cybersecurity frameworks, they usually mean things like NIST CSF or ISO 27001. But when you start getting into physical security—especially in data centers—you quickly realize there are multiple standards, and they don’t all do the same thing. If you’re deploying cameras, access controls, or evaluating a facility, the question becomes: Which framework should I actually use? This post breaks down three of the most relevant standards: ISO/IEC 27001:2022 – Information Security Management...

5 Common Security Mistakes Small Businesses Make (And How to Fix Them)

Most small and mid-sized businesses aren’t ignoring cybersecurity—they’re just trying to balance it with everything else. The problem is, a few common gaps show up over and over again. Not because people don’t care, but because no one has clearly explained what actually matters. Here are the five most common mistakes I see—and what to do about them. 1. Assuming “We’re Too Small to Be Targeted” This is the most common—and most dangerous—assumption. Most attacks today aren’t targeted. They’re automated. Attackers scan the internet looking for: weak passwords exposed services outdated systems If...

When April Fools Becomes a Security Risk

Every year on April 1st, the internet fills up with jokes, fake announcements, and pranks. Most of it is harmless. But in cybersecurity, April Fools creates a very real problem: It becomes harder to tell what’s real—and what’s not. And that hesitation can be costly. Real Incidents, Bad Timing In 2026, multiple legitimate cybersecurity events happened right on April 1st. A major crypto platform was hacked, losing hundreds of millions of dollars A large company disclosed a real cyber incident affecting its systems In both cases, early reactions were mixed: “Is this real?” “Is this just a stunt?”...

Is My MSP/MSSP enough?

Do I Need a vCISO or Is My MSP Enough? If you’re a small or mid-sized business, you’ve probably asked a version of this question: “We already have an IT provider… aren’t they handling security?” It’s a fair question—and the answer is: Your MSP is essential. But they’re not designed to own your security strategy. What Your MSP Does Well Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) are critical partners. They: Keep systems running Deploy and manage security tools Respond to alerts and incidents Handle day-to-day IT operations In other words: They operate your...

Why engage a vCISO?

Why Small and Mid-Sized Businesses Should Consider a vCISO If you run a small or mid-sized business, you’ve probably asked yourself a version of this question: “Do we really need a CISO?” The honest answer is: You need what a CISO does—not necessarily the full-time salary that comes with one. That’s where a vCISO (virtual Chief Information Security Officer) comes in. Security Is About Maturity, Not Magic Let’s start with a reality check. Cybersecurity isn’t about buying the right tool or hiring a “rockstar engineer.” It’s about process maturity and risk reduction over time. Good security...

How Do I Recover From Ransomware?

Why Modern Backup Strategy Matters (3-2-1-1) A friend of mine works in IT consulting, mostly on the operational side of things. He was recently called in by a potential client who had started seeing some concerning messages on their computer—clear warning signs that something wasn’t right. He advised the client to slow down, investigate, and address the issue properly. The client chose a different path. They prioritized getting the business back up and running as quickly as possible. A week later, they were hit with ransomware. The First Recovery… and the Missed Gap To his credit, my friend...

What Happens During a Cybersecurity Review?

Cybersecurity can feel overwhelming. There are thousands of tools, vendors, and security products, and it is not always clear where organizations should focus their efforts. A cybersecurity review helps organizations step back and evaluate whether their current security posture is addressing the most important risks. Understanding Risk Exposure The review begins with understanding the organization’s risk profile. Important questions include: What types of data does the organization store? What systems are critical to operations? What would the impact of downtime or data loss be? Security...