Cyber With Debra!

Care. Learn. Secure.

Category: Uncategorized

  • Changes happen constantly across organizations. Systems are updated, configurations are adjusted, and new tools are introduced to support business needs. While change is necessary, not every change carries the same level of risk. That is why how a change is handled matters just as much as the change itself. In this week’s comic, someone approaches…

  • Security does not start with tools or controls. It starts with knowing what you are actually responsible for protecting. Many organizations rely on a wide range of devices, systems, applications, and services to operate. Over time, it becomes easy to lose track of what exists, who owns it, and how critical it is to daily…

  • Data is shared every day, often without much thought. Files are emailed, uploaded, and forwarded as part of normal work. But not all data should be treated the same way, and that is where data classification comes in. Data classification is the process of identifying how sensitive information is and deciding how it should be…

  • Modern organizations rarely operate alone. Vendors, partners, and service providers often need access to systems, data, or networks to get work done. While these relationships help businesses move faster, they also introduce new security risks that cannot be ignored. Third-party risk management focuses on understanding and reducing the risks that come from working with external…

  • A Year-End Reflection from Cyber With Debra. As the year comes to a close, I have shared many stories through Cyber With Debra. Stories about preparation, protection, response, and restoration. But Christmas reminds us that long before cybersecurity existed, God was already teaching humanity these same principles through redemption. The story of Christmas did not…

  • When people think about backups, they often picture a safety net. Something you set up once and hope you never need. But in the real world, backups and recovery are not the same thing, and understanding the difference matters more than most people realize. In this comic, Joe walks into Debra’s office with a real…

  • Software updates appear often, but many people click remind me later without a second thought. What seems like a small delay can create a real security risk. Updates exist for a reason, and one of the most important reasons is patching vulnerabilities before attackers find them. Patch management is the process of keeping systems updated…

  • When a new device is unboxed, most people assume it is ready to use. The truth is that many laptops and systems come with default settings that are far more open than they seem. Features that are rarely needed may be turned on, extra apps may be installed, and unnecessary services may be running in…

  • There are certain accounts in a system that hold more power than others. They can install software, change settings, view sensitive information, or even shut things down if needed. These are called privileged accounts, and when they are misused or left unmanaged the impact can spread very quickly. In this week’s comic, Brittany asks why…

  • Passwords have been around for a long time, but they are no longer enough to keep accounts safe. They can be guessed, shared, reused, or stolen without anyone noticing. That is why many apps and systems now use Multi Factor Authentication, or MFA. It adds another step to confirm identity before access is granted. In…