76 Posts

Kevin Beaver

Independent Information Security Consultant

Kevin Beaver is an information security consultant, writer, and professional speaker with Atlanta-based Principle Logic, LLC. With over 29 years of experience in IT and 23 years specializing in security, Kevin performs independent security assessments and consulting to help businesses uncheck the boxes that keep creating a false sense of security. He has authored/co-authored 12 books on information security, including the best-selling "Hacking For Dummies" and "The Practical Guide to HIPAA Privacy and Security Compliance." In addition, Kevin is the creator of the Security On Wheels information security audiobooks and blog providing security learning for IT professionals on the go. You can learn more and link to Kevin's articles, blog posts, videos and more at his website, www.principlelogic.com.

Written By Kevin Beaver

5 Tips to Bring Colleagues on Board With Information Security Systems

The more employees and business leaders are involved with your information security systems, the more long-term buy-in you'll have when it comes to following security policies and best practices.

Cybersecurity Skills Aren’t Just for Security Professionals Anymore

Real security improvement comes when everyone in the workplace, not just IT and security professionals, is serious about practicing cybersecurity skills and habits.

An Open Letter to Security Managers: Stop Trying to Do It All

Security managers and IT teams today often try to tackle everything in-house, even though they don't always have the skills and resources to run an effective security program.

Why Your Security Policies Could Be Failing Your Business

Over the past three decades in IT, a persistent problem lingers over even the most well-documented enterprise security policies: lackluster implementation.

Why You Shouldn’t Overlook Personal Electronic Devices in Your Enterprise Network

When it comes to protecting personal electronic devices, a strong organizational culture of security, from top management to the most junior employees, is imperative.

Four Steps to Close the Window on Critical Vulnerabilities

Critical vulnerabilities often remain unaddressed when an organization is unwilling to allocate resources to routinely update applications. Take steps now to secure your network against exploitation.

Why It’s Time to Cross Out the Checklist Approach to Vendor Security

When it comes to vendor security, all the handshakes and paperwork that go into a business deal tend to get in the way of proper audits and thorough vulnerability assessments.

What Security Lessons Can Large Enterprises Learn From Small Businesses?

Large enterprises can learn crucial security lessons from small and midsized organizations — which often have a stronger culture of accountability and responsibility when it comes to data protection.

Discover What Happened After a Security Incident — Without Losing Your Cool

When a dreaded security incident or breach takes place, you'll face your true testing time. Here's how to discover what happened after a security incident — without losing your cool.

What Are the Consequences of Neglecting User Security Training?

Are your user security training efforts working? You may have never paused to think about the relationship your users have with your security program.