Cybersecurity Strategy

Awesome Security content for all skill levels.

Security Awareness Training

Learn not just the what but also the why of security awareness. This will help make things stick. Click the course image or button below to get started.

  • Training for individuals and businesses
  • 8,700+ students
  • $19.99 $49.99

Recent Security Awareness Posts

Security Awareness Topic: Phishing

Security Awareness Topic: Phishing

Every organization should have a security awareness program. If you don't, start making preparations to run one. One area you can start is instruction on the dangers of phishing. The Security Awareness category on Best of Roy will show topic ideas to keep in mind for...

read more

ID Theft Prevention and Personal Finance Security

There’s a lot of free material on protecting your finances but have you actually followed through on any of the tips? This course will help you follow through as a trusted friend would. Click the course image or button below to get started.

  • Training for individuals
  • 1,000+ students
  • $19.99 $49.99

Recent ID Theft Prevention Posts

Top 5 Pins

Top 5 Pins

What's a Top 5 Passwords list without a good top 5 pins list. Just like passwords though, people usually aren't as good being unique as they think they are. Some don't even try. David Harley originally discussed a data set of common PINs compiled by Daniel Amitay in a...

read more
Top 5 Passwords

Top 5 Passwords

Here comes one of my favorite things to look at, the top 5 passwords. It's a good reminder that people aren't as unique as they think they are. It may be a pain to come up with a long, complex password, but the extreme convenience you're using to forgo a secure...

read more
Simple Ways To Mitigate Internet Attacks

Simple Ways To Mitigate Internet Attacks

We are all potential victims of internet attacks. The tips below are not a definitive guide to completely avoiding attacks but they will at least help mitigate the attacks. You definitely should NOT try to create a scene or provoke any potential attackers. Try to at...

read more

How to Write an Information Security Policy That People Will Actually Read

“If you can’t translate your requirements into effective policy, then you’ve little hope of your requirements being met in an enforceable way,” says Rob McMillan, research director at Gartner. “But if you get it right, it will make a big difference in your organization’s ability to reduce risk.”

The good news: You don't need to reinvent the wheel. Learn from my mistakes and get everyone on the same page in this comprehensive course.

  • Training for infosec pros and security teams
  • Accepting new students
  • $19.99 $199.99

Recent Documentation Posts

Software Standards for IT Service

Software Standards for IT Service

If your organization doesn't have a set of software standards, ask yourself or your IT Managers the following questions to begin documenting: What software is mandatory (business critical or daily driver)? What software is required for a particular job or business...

read more
Exploring Policy Format Tips

Exploring Policy Format Tips

We kicked off the exploring series by taking a look at policies. We started with recognizing policies as a major type of documentation. We moved into the importance of having policies. Then we took a look at how a policy is created and effected. In order to wrap up...

read more

Pin It on Pinterest