Blog
Transformative Leaders are the Key to Success in SLED Cybersecurity — Get the Full Report
We spent the past year surveying senior leaders, analysts, and experts, identifying trends and successes that are defining a new generation of cybersecurity visionaries within the SLED community. During this research, it was clear that the characteristic that defines...
Improve Your Argument to Move Past Cybersecurity FUD
In the past year, we saw tremendous growth in cybersecurity, with many new professionals entering our industry. Looking to 2023 and beyond, I expect even more growth. It’s always interesting to see newcomers find their own position on cybersecurity drivers, many of...
Risk Assessments in Everyday Life
Risk Assessments in Everyday Life At NuHarbor, our Security Advisory experts specialize in risk assessment and consciously think about risk every day. Sometimes this is good, like when a friend extends the invite to go cliff jumping or skydiving in Mexico. Other...
The Path to Improve Your Application Security Posture
“Software is eating the world.” – Marc Andreessen (Wall Street Journal, 2011) Application security (AppSec) is the most misunderstood and underserved security challenge facing every organization, security team, and developer. No matter your perspective, the perceived...
Recruiting Your Best Security Partner
When an organization reaches a certain size or adopts a more strategic role for security in their planning and operations, they look for a Chief Information Security Officer (CISO) who can act as an advisor and a bridge between cybersecurity teams (and challenges) and...
Three Steps to Relieving the Cybersecurity Workforce Skills Gap
Across all industries, workforce recruitment and retention are more challenging than they’ve been in decades, with the total unfilled job vacancies in the U.S. more than double what it was 10 years ago. In cybersecurity, this problem has been well-documented for over...
NuHarbor Security Recognized in 2022 Splunk Public Sector Partner Awards
NuHarbor Named Public Sector Cloud Partner of the Year Winner for Outstanding Public Sector Performance Colchester, VT – June 15, 2022: NuHarbor Security, the industry’s most comprehensive managed security provider, announced today it has received the 2022 Public...
NuHarbor Strengthens Partner Ecosystem With Strategic Addition of Zscaler
The Addition of Zscaler Supports Joint Efforts to Provide Clients With a Zero Trust Framework to Meet Government Security Standards Colchester, VT – June 1, 2022: The industry’s most comprehensive managed security provider NuHarbor Security has strengthened its...

Ubuntu Server Hardening Guide
Original Author: Hunter Gregal Updated By: Justin Fimlaid ***NOTICE*** To those reading this... 3/8/22: I think *most* of this information is still good but please be cognizant of the Ubuntu version numbers. There's some great comments at the bottom about additional...

Sharing Threat Intelligence is Caring — Unless it’s with the Person Attacking You!
For as long as I've been in Cybersecurity, we have this "thing" about sharing threat intelligence. In State and Local Government, this is even more apparent, as the public sector leans towards being fairly collaborative. In this community, there are two main drivers...

What to Consider When Budgeting for Cybersecurity
2021 was an action-packed year for cybersecurity, from ransomware to phishing, attacks were on the rise. With the new year approaching, it is important to start planning for defenses ahead of time based on what is already known about the current state of the industry....

Cyber Safety: Prevention, Protection and Everything in Between
What is Cyber Safety? Being online exposes us to criminals and individuals with ill intent. Cyber safety is the practice of being safe online. It is a complex set of ideas and practices that culminate to achieve a common goal. This goal is to protect users while...

Don’t Get Hooked! How to Identify Common Types of Phishing Attacks
Phishing attacks can affect individuals and organizations and are among the most common methods hackers use to attack accounts and networks. Over the years, they have become more sophisticated and challenging to detect. According to Verizon, in 2020, 22% of data...

5 Tips to Secure Your Devices
Why You Should Secure Your Devices Human error is the weakest link in cybersecurity. Individuals want to cut corners on devices they use for efficiency, especially ones that are used hundreds of times a day. Although it’s nice to open a phone by clicking one button,...

What is Penetration Testing?
Penetration Testing Penetration Testing, also known as “pen testing,” is an exercise in testing an organizations cyber security posture. While not the only step in securing an organization, it is a critical one that should not be overlooked. Penetration Testing is...