top of page

Stickley on Security

  • Writer: Ron Salazar
    Ron Salazar
  • Aug 29, 2024
  • 2 min read

Updated: Jan 12

Organizations today face several critical cybersecurity challenges that can significantly affect their operations. The increasing sophistication of cyber threats, such as Advanced Persistent Threats (APTs), ransomware, and phishing attacks, poses a substantial risk. These threats are becoming more advanced and harder to detect, endangering sensitive information. Additionally, compliance with complex regulations like GDPR, HIPAA, and PCI-DSS adds another layer of difficulty, requiring stringent security measures to ensure data privacy and regulatory adherence. Furthermore, many organizations struggle with insufficient security awareness among employees, who may inadvertently fall victim to phishing and other social engineering tactics due to lack of proper training.


To combat these challenges, Stickley on Security provides targeted solutions designed to bolster organizational security. Their approach includes:


  • Impersonation Attack Prevention:

    • Proactive identification and monitoring of lookalike domains with unlimited takedown services for malicious domains.  This is the #1 tactic for business email compromise (BEC).


  • Fully Automated Employee Training, Awareness, Phishing Simulation:

  • Assists organizations in easily implementing security training for employees on the latest topics along with weekly awareness articles and randomized monthly phishing simulations.  Personally conducted by noted security expert Jim Stickley (as seen on NBC, CNN, CNBC, Lifelock commercials, and other media outlets/publications).

  • Meets requirements for cybersecurity insurance policies.  Easy to implement security awareness center assists banks/credit unions to easily and cost effectively meet FFEIC mandates.


  • Next Generation Security Solutions Leveraging Automation:

    • Fully automated network Penetration (PEN) testing.

    • Automated risk assessment / continual monitoring of all security services behind the firewall.

    • Virtual Desktop.  Automated cost optimization, deploy any compute size worldwide using only 1/3 of the typical bandwidth of VDI.

 

By addressing these areas, Stickley on Security helps organizations improve their cybersecurity posture, better protect against evolving threats, and ensure compliance with relevant regulations.



Comments


About the Author
Ron Salazar

Ron Salazar Founder & CEO, MR2 Solutions | Creator of TBaaS™ | Founder, CTL Network 

Ron Salazar is a technology executive and strategic advisor with over 20 years of experience leading digital transformation across multiple industries. He is the founder of MR2 Solutions and the CTL Network, where his work focuses on elevating IT leadership by helping organizations make clear, informed, and forward-thinking technology decisions amid rising complexity, cost pressures, and cyber risk.

To address the bias and fragmentation common in technology decision-making, Ron created Technology Brokerage-as-a-Service (TBaaS™) - a vendor-neutral framework designed to simplify IT strategy across cloud, cybersecurity, AI, communications, and infrastructure modernization. Under his leadership, MR2 Solutions has grown into an ecosystem of 400+ technology providers and advisors, while the CTL Network brings together CIOs, CTOs, CISOs, and senior IT leaders to collaborate, learn, and lead with confidence.

Connect on LinkedIn

bottom of page