5 Tips to Keep Cyber-safe this Vacation Season

By Redbud on Jun 26, 2018 11:56:18 AM

Summer is here and whether you’re still at the office most of the time or you’re spending your days at the pool, you’re probably taking a vacation at some point. Just like your home requires someone to bring in the mail and feed the cat, there are some precautions you should take to protect your security and your online data as well.

Continue Reading

How More Representation in Pop Culture Can Help the Cyber Security Industry

By Redbud on Apr 11, 2018 9:19:00 AM

Cyber security attacks have been an ongoing problem in this technology driven world. Attacks are being launched against everyone from large corporations to single individuals. The result of these can have a tremendous negative economic impact on a victim. As the number of cyber threats continue to grow, the industry could use some help recruiting skilled professionals. With the lack of representation in pop culture, many might not have realized this career was an option. Seeing more of this industry in everyday media can help introduce it to a new audience.

Topics: Uncategorized
Continue Reading

The Dangers Within Trusted Websites

By Redbud on Mar 9, 2018 9:52:02 AM

Websites that seem to be trustworthy are not always safe. In recent years, cyberattacks have been perpetrated through what people believe to be safe websites. According to Menlo Security’s State of the Web 2017, of the top 100,000 websites, 42% were deemed “risky” due to the following reasons: the use of vulnerable software, a history of distributing malware, and experiencing a security breach within the last year. In general, news and media sites was the category with the largest risk factor with 49%. In 2017, Business and Economy sites were hit with the most security risks incidents with 23,819.

Continue Reading

New Year’s Resolutions? Don’t Forget About Your Cyber Security

By Redbud on Jan 19, 2018 3:00:15 PM

The New Year brings about many personal resolutions whether it’s to lose weight, drink more water, or just be happier. But those resolutions don’t have to stop there, why not extend it them to other areas in your life? Cyber security is a great example of one of those areas. Yes, you read that right. Why not start the New Year with some changes to the way you use and think about cyber security. Don’t know where to start? Well, here are 3 cyber security New Year’s resolutions to start you off:

Topics: Uncategorized
Continue Reading

Computer Security Day

By Redbud on Nov 30, 2017 10:11:26 AM

close up of a calendar

In the United States, November 30th is Computer Security Day. The purpose of this day is to bring awareness to the risks of the internet and urge users to protect themselves and their technology. As the years have progressed the internet has become a greater and greater part of everyday life. It is uncommon to walk down a city street and not see a cellphone, tablet, or Bluetooth speaker in someone’s ear. What these people don’t think about is the risk that comes with having the latest technology. Today, it is encouraged that people take a step back and review some of the tips that can keep them and their technology safe from potential threats.

Continue Reading

What You Need to Know About Ransomware

By Redbud on Sep 29, 2017 10:28:42 AM

Closeup of businessman with handcuffed hands against red bleachers looking down on football pitch

Ransomware attacks are increasing at a terrifying rate. Recently, the ransomware attack “WannaCry” affected an alarmingly high number of individuals. In mid-May of this year, over 230,000 computers were affected spanning more than 150 countries. Individuals along with major corporations were targeted through the Windows operating system. Unless the ransom was paid, the organization would not be able to retrieve their encrypted data.

Continue Reading

3 Ways to Keep Your Employees Happy

By staff on Mar 31, 2017 6:56:57 AM


To foster a successful work environment, it is important to make sure your employees are happy. Turnover from unhappy employees will not only lead to stress and loss of profits, but you may even find yourself in a difficult position with successful recruitment. Employees and ex-employees talk, so in order to ensure the talk is positive take a look at the following suggestions.

Continue Reading

How to Make Your Company Attractive to Job Seekers

By staff on Mar 15, 2017 12:18:21 PM

In today’s economy, job seekers are getting increasingly specific on identifying what they want in a company before even starting the application process. It’s getting difficult for companies to stand out from the crowd and attract future prospects that will represent the top tier of professionals in their field.

Continue Reading

The Cloud and Cyber Security

By staff on Feb 28, 2017 12:28:38 PM

Cloud based technology first started gaining popularity in the early 2000s, but it has evolved exponentially since then. In fact, you are probably utilizing it even if you don’t realize it. If you use LinkedIn, Constant Contact or operate on an iOS platform, you’re using cloud technology. This technology has become more prevalent as each year passes and is now being used by businesses all over the world.

Continue Reading

How to Identify Phishing Attacks

By staff on Feb 14, 2017 12:46:20 PM

Phishing is an increasingly popular way for cybercriminals to steal a user’s personal information. Phishing is accomplished through electronic communication, usually in the form of a fake website that appears to be genuine, and can be difficult for the average person to detect. These nefarious cyber invitations will seem to be coming from a legitimate source to trick users into revealing login information or to install malware on their computers. Hackers do this by requesting sensitive details about bank information and personal identity or they include dangerous attachments in emails.

Continue Reading

Human Error and Cyber Security

By staff on Jan 31, 2017 10:55:31 AM

There are federal laws in place that ensure companies enforce a number of cyber security measures to protect themselves against cybercrimes. These laws are a great way to encourage businesses to stay up-to-date on preventative tactics. Unfortunately, these guidelines mainly address the more technical side of cyber security and don’t put enough emphasis on human errors.

Continue Reading

How Your Resume Can Grab a Cyber Security Recruiter’s Attention

By staff on Dec 30, 2016 2:16:09 AM

Your resume has only one chance to make a good first impression. With the amount of competition out there, you want it to be the best possible impression so you land the cyber security job that is right for you. Here’s how you can grab a cyber security recruiter’s attention with your resume:

Continue Reading

3 Mistakes a Company Makes after a Cyber Attack Occurs

By staff on Dec 15, 2016 5:14:41 PM

Unfortunately, the truth of the matter is companies of all sizes are victims to cyber attacks. We’ve discussed cyber security statistics, lessons learned, terms to know and prevention tactics in previous posts, and all these topics revolved around the idea of anticipating and reacting to a cyber attack. But one topic than tends to get swept under the rug are the mistakes made by companies after a cyber attack has occurred. Let’s look at three major mistakes.

Continue Reading

5 Staggering Cybercrime Statistics

By staff on Nov 30, 2016 9:19:40 AM

If you think your business doesn’t need cyber security to protect its sensitive data, check out some of the staggering cybercrime facts posted by Security Intelligence earlier this month. We’ve listed the top five we think are especially important, but all the facts can be found here.

Continue Reading

Lessons Learned from Hacked Companies

By staff on Nov 15, 2016 12:41:05 PM

Target. Sony. Ashley Madison. What do these companies have in common?

Continue Reading

6 Cyber Security Terms to Know

By staff on Oct 31, 2016 4:52:45 AM

Cyber security attacks are continuously on the rise as hackers evolve their cyber scams. The best way to avoid a hack is to have a proactive and preventative approach to protecting your data. Familiarizing yourself with common cyber security terms can help you recognize a threat and help guard your information from an attack.

Continue Reading

How to Protect Yourself Online

By staff on Oct 17, 2016 3:26:49 PM

Cyber security attacks come in all sizes ranging from global (Cyberterrorism) to industrial (ransomware) to the individual (hacks on personal information).

Continue Reading

Pros and Cons of Two-Step Verification for Gmail

By staff on Sep 30, 2016 5:00:36 AM

Google’s two-step verification has been around for years and for a good reason: It is an added layer of protection for Gmail accounts that keeps email secure. Two-step prevents other people from accessing your email by having you enter your password and then a security code that’s texted to your phone each time you sign in. The chance that a hacker has both your password and phone to access a security code text is unlikely, so once these two steps are completed, Google is confident that you are the official account holder and allows you to access your email.

Continue Reading

4 Skills Every Cyber Security Expert Should Possess

By staff on Sep 14, 2016 2:06:12 PM

Let’s face it, hackers aren’t going away anytime soon as technology continues to become a part of our daily lives. But finding true cyber security experts can be difficult because there aren’t enough people who possess the proper skills to fill in those shoes. If you’re looking for a cyber security expert to join your company, below are four of the professional and personal skills you should look for in a candidate.

Continue Reading

3 Benefits of Cyber Security

By staff on Aug 31, 2016 5:05:03 AM

Cyber security improves businesses and organizations on a variety of levels, but three of the top benefits of cyber security are:

Continue Reading

Why We Need More Cyber Security Professionals

By staff on Aug 18, 2016 6:20:01 PM

From medical and government data to financial and personal information, millions of records are stolen and exposed by cyber attackers every year. Since secure information is used, transferred and stored online every day for personal or business reasons, there is an increased risk for having that important information stolen by hackers. Cyber attacks often catch people off guard, and a lot of the times most people don’t even know when their private information has been stolen or exposed until it is too late. As a result, cyber security professionals are in high demand for companies across all industries as online security evolves and becomes more complex.

Continue Reading

Strategies to Update Your Cyber Security Resume This Summer

By staff on Jul 29, 2016 11:04:05 AM

Tailoring your resume to fit the specific qualifications of the cyber security job you are applying for will help push your resume to the top of the pile. Understanding a company’s unique needs and practices while also remaining truthful about your expertise is key. It’s important to clearly write out your previous roles, functions and skills on paper and elaborate further in an interview. For these reasons, your resume is of the utmost importance because it is the first impression you are giving to an employer.

Continue Reading

Cyber Security: What is it?

By staff on Jul 7, 2016 12:11:14 PM

Cyber security, also known as information technology security, focuses on protecting computers, networks, programs and data from people who have unauthorized access or intend to destroy important information. Cyber security is important to businesses, agencies and organizations of all sizes. Hospitals, governments, corporations, the military and other businesses have confidential and sensitive information on their computers and the computers they transmit data to. Because cyber attacks are becoming more prevalent, ongoing attention and security is needed to protect sensitive information.

Continue Reading

4 Tips for Landing Great Cybersecurity Talent—Speed is Key

By khenley on Jun 15, 2016 6:19:39 PM

Speed is key in hiring that next great talent for your organization, especially a cybersecurity professional. To speed up a hiring process, human resources (HR) needs to determine what they must do to quickly and efficiently bring top talent on board. The best candidates are not looking for jobs. According to LinkedIn Talent Trends 2015, 70% of the workforce are passive candidates. But for the right opportunity, they might consider a move to another organization. If a tempting offer comes their way, potential candidates will start to go through the pros and cons of changing their job. They start to think of positive aspects as to why they should move and the negative things about their job. If the hiring organization does not react quickly, the candidate might start to look elsewhere.

Continue Reading

How a Boutique Cybersecurity Recruiting Agency Can Help You

By khenley on Apr 26, 2016 10:50:14 AM

“We’ve been looking for months on our own, can you help us?” These are familiar words heard by Ken Henley, CISSP, CEO & Founder of Redbud, a Cybersecurity Boutique Recruiting firm based in Chicago.

Continue Reading

How 5 Top Cybersecurity Certifications Can Advance Your Career

By khenley on Apr 19, 2016 9:40:40 AM

Opening the door to career advancement and ensuring you are a valuable asset to your organization, requires selecting the right cybersecurity certifications to complement and support your experience and expertise. Building your credentials may not guarantee a promotion but validates your skill level and demonstrates a passion for your craft.

Continue Reading

5 Cybersecurity Recruiting Mistakes Made by Employers

By khenley on Apr 7, 2016 3:30:29 PM

Closeup portrait young funny looking guy, sarcastic, anxious business man crossing fingers, wishing, hoping for luck, miracle isolated grey wall background. Emotions, facial expressions, feelings

Recruiting mistakes can cost an employer time and money. With the rise of security threats on organizations’ websites and server infrastructure, the demand for hiring cybersecurity professionals is also on the rise. When trying to fill a cybersecurity position, an organization wants to hire the best possible candidate that their budget allows. With the demand high and the supply short, an organization wants to keep their options open to land the right candidate. Minimizing mistakes in the recruiting process along the way.

Topics: Uncategorized
Continue Reading

Why Cyber Security Needs its Own Recruiting Category

By khenley on Feb 27, 2016 3:18:27 PM

The demand for Cyber Security professionals is unprecedented. The bad guys aren't going away any time soon. As long as technology evolves, so too will the cracks in technology continue to be exploited. Universities are producing educated Cyber pros at breakneck speed but not experienced Cyber professionals. In demand are those who have already seen combat. The vets; heroes that have seen a sufficient number of cyber ground-wars.

Continue Reading