How to Set Up an SPF Record
A step-by-step guide to creating, publishing, and validating an SPF record in your DNS to stop unauthorized senders from spoofing your domain.
How to Configure DKIM for Email Authentication
Learn how to generate DKIM keys, publish them in DNS, and enable signing on your mail server to cryptographically authenticate every outbound message.
How to Set Up DMARC from Monitor to Enforce
A phased guide to deploying DMARC, starting with monitoring mode to collect data, then progressively tightening policy to quarantine and finally reject.
How to Enforce MFA in Microsoft 365
A complete guide to enforcing multi-factor authentication in Microsoft 365 using Security Defaults or Conditional Access policies for every user account.
How to Enforce MFA in Google Workspace
Enable and enforce 2-Step Verification across your Google Workspace organization with a phased rollout, security key options, and exception handling.
How to Create an Incident Response Plan
A practical guide to writing a cybersecurity incident response plan that defines roles, procedures, and communication protocols for when a security event occurs.
How to Run a Cyber Defense Score Scan
Learn how to use Cyber Defense Agent to scan your domain, understand what the scan evaluates, and take your first steps toward improving your security posture.
How to Read Your Cyber Defense Score
A detailed walkthrough of the Cyber Defense Score report, explaining each category, grade, and finding so you can turn results into an actionable remediation plan.
How to Set Up EDR for Your SMB
A practical guide to selecting, deploying, and configuring an EDR solution for small and mid-size businesses, from agent installation to alert management.
How to Configure SSL/TLS for Your Web Server
A comprehensive guide to configuring TLS on your web server with the right protocol versions, cipher suites, certificate chain, and security headers.
How to Implement a 3-2-1 Backup Strategy
Implement the industry-standard 3-2-1 backup strategy to protect your business data against hardware failure, ransomware, and natural disasters.
How to Create a Cybersecurity Policy
Create a cybersecurity policy that defines acceptable behavior, access controls, data handling requirements, and accountability for every employee in your organization.
How to Conduct a Cybersecurity Risk Assessment
A step-by-step methodology for conducting a cybersecurity risk assessment that identifies your critical assets, threats, vulnerabilities, and produces a prioritized risk register.
How to Prepare for a Cyber Insurance Application
A practical checklist to prepare your organization for a cyber insurance application by implementing the security controls that underwriters now require.
How to Respond to a Data Breach
A step-by-step breach response playbook covering immediate containment, forensic investigation, regulatory notification, and recovery procedures.
How to Set Up an Organization-Wide Password Manager
A complete guide to selecting, configuring, and rolling out an enterprise password manager to eliminate password reuse and strengthen credential security.
How to Train Employees on Cybersecurity
Design and implement a security awareness training program that measurably reduces human risk through phishing simulations, role-based education, and continuous reinforcement.
How to Secure Remote Work for Your Team
A practical checklist for securing remote work environments including VPN configuration, endpoint hardening, access controls, and secure communication policies.
How to Evaluate a Managed Security Service Provider
A structured framework for evaluating and selecting a managed security service provider that matches your organization size, budget, and risk profile.
How to Prepare for a SOC 2 Audit
A comprehensive checklist to prepare your organization for a SOC 2 Type II audit, covering trust service criteria selection, control implementation, and evidence collection.
Get your Cyber Defense Score™ in 60 seconds.
See where you stand before implementing any changes.
Get My Cyber Defense Score™ →