top of page
Search
Anthony Cruz
Sep 10, 20244 min read
Proving Grounds Practice "BackupBuddy" CTF Walkthrough
Security Engineer Anthony Cruz reports on a recent CTF adventure.
107 views0 comments
Sebastian Bowman
Sep 6, 20239 min read
Unveiling An Invisible Threat: WIFI Perils of Digital Tracking
We live in a hyper connected world where radio frequencies seamlessly intertwine alongside us with every step we take. If you were to...
114 views0 comments
Katy Munden Hays
Jul 27, 20232 min read
Gain Peace of Mind with At-Home Cybersecurity
We are ready to use our business security expertise to help you protect your home, family, and personal life against cyber threats.
35 views0 comments
Katy Munden Hays
Jun 1, 20233 min read
What 6 things should you know before your first cybersecurity job?
Since we provide cyber defense, offense, & education, we asked our staff: What 6 things should you know before your first cybersecurity job?
49 views0 comments
Katy Munden Hays
Apr 26, 20235 min read
Beginner's Guide to HID iClass Cloning with the Flipper Zero
Our StandardUser team is excited to share new processes we're learning. Thanks to Sebastian Bowman, Security Engineer, for this guide. As...
14,576 views0 comments
Katy Munden Hays
Apr 7, 20233 min read
How to Limit Insider Threats
People are any company’s greatest asset. People build the systems, people run the systems, and people are responsible for keeping a...
30 views0 comments
Katy Munden Hays
Mar 2, 20232 min read
4 Cybersecurity Problems & Solutions
We review four common problems we hear about from clients, and the solutions we recommend for each.
62 views0 comments
Katy Munden Hays
Feb 10, 20234 min read
Set a Cybersecurity Road Map with These 10 Questions & Steps
It's a brand new year. Where are you heading next on your cybersecurity journey 🌄? If you spend some time creating a cybersecurity road...
77 views0 comments
Katy Munden Hays
Jan 3, 20234 min read
What's Old is New Again: Learn from Cyber History with Documentation
“Those that fail to learn from history are doomed to repeat it.” - Winston Churchill “Sooner or later, everything old is new again.” -...
33 views0 comments
Katy Munden Hays
Dec 5, 20223 min read
Humans are the Answer
We would like to end the year on a hopeful note. There is plenty of talk of data breaches, of security gaps, and of insider threats...
23 views0 comments
Katy Munden Hays
Sep 22, 20226 min read
See Yourself in Cyber: Your Role is Greater Than You Think
Cybersecurity Awareness Month 2022. Make life easy for you. Make it hard for the bad guys. It’s the theme of this year’s Cybersecurity...
98 views0 comments
Katy Munden Hays
Sep 12, 20224 min read
Cyber Resilience Through Communication: Break the Silos
Communication among people is key to the success of any team. As organizations mature in cyber resiliency, it becomes clear that...
48 views0 comments
Katy Munden Hays
Sep 6, 20222 min read
Back to Basics: Layer, Layer, Layer Cybersecurity Solutions
When winter comes, two quality blankets layered on the couch are better than one. The same is true with cybersecurity. Be sure that you...
31 views0 comments
Katy Munden Hays
Aug 23, 20223 min read
Back to Basics: Stick to Cyber Safety Practices
Two dogs are close to each other on a snowy yard, seeming to sniff at each other to see if each one wants to trust the other.
42 views0 comments
Katy Munden Hays
Aug 17, 20223 min read
Back to Basics: Make (& Follow!) a Plan
Make a cybersecurity plan. And then FOLLOW the plan. Without a plan and vigilant follow-through, very few security measures will be...
30 views0 comments
Katy Munden Hays
Aug 9, 20223 min read
Back to Basics: Develop Your Team & Company Security Culture
As students head back to school this month, we’re heading back to the cybersecurity basics and reviewing some best practices for a secure...
43 views0 comments
Katy Munden Hays
Aug 8, 20222 min read
StandardUser Cyber Security Hosts Ribbon Cutting at Historic Bank Building
In conjunction with the Denton Chamber of Commerce, StandardUser Cyber Security will host a ribbon cutting event for our new office space...
19 views0 comments
Katy Munden Hays
Jul 28, 20223 min read
Layers of Cybersecurity – 3 Key Areas to use Defense in Depth
It’s important to start with a plan. Before you design your network security policies, you need some goals and direction. Since we offer...
119 views0 comments
StandardUser
Jul 15, 20227 min read
What's wrong with Zero Trust?
Why terminology matters and why we need each other. Be prepared – we might upset some people here. We’ll be taking issue with a well-used...
64 views0 comments
Katy Munden Hays
Jun 28, 20224 min read
Where to Start? Three Basic Cybersecurity Needs
You probably hear a lot of talk of cyber hardening and cyber resilience. Though you know it’s time to put your shields up and tighten...
47 views0 comments
bottom of page