20 Guides

Cybersecurity How-To Guides

Step-by-step guides to implement the security controls that cyber insurers require and compliance frameworks mandate.

How to Set Up an SPF Record

A step-by-step guide to creating, publishing, and validating an SPF record in your DNS to stop unauthorized senders from spoofing your domain.

6 steps

How to Configure DKIM for Email Authentication

Learn how to generate DKIM keys, publish them in DNS, and enable signing on your mail server to cryptographically authenticate every outbound message.

6 steps

How to Set Up DMARC from Monitor to Enforce

A phased guide to deploying DMARC, starting with monitoring mode to collect data, then progressively tightening policy to quarantine and finally reject.

7 steps

How to Enforce MFA in Microsoft 365

A complete guide to enforcing multi-factor authentication in Microsoft 365 using Security Defaults or Conditional Access policies for every user account.

6 steps

How to Enforce MFA in Google Workspace

Enable and enforce 2-Step Verification across your Google Workspace organization with a phased rollout, security key options, and exception handling.

6 steps

How to Create an Incident Response Plan

A practical guide to writing a cybersecurity incident response plan that defines roles, procedures, and communication protocols for when a security event occurs.

7 steps

How to Run a Cyber Defense Score Scan

Learn how to use Cyber Defense Agent to scan your domain, understand what the scan evaluates, and take your first steps toward improving your security posture.

6 steps

How to Read Your Cyber Defense Score

A detailed walkthrough of the Cyber Defense Score report, explaining each category, grade, and finding so you can turn results into an actionable remediation plan.

6 steps

How to Set Up EDR for Your SMB

A practical guide to selecting, deploying, and configuring an EDR solution for small and mid-size businesses, from agent installation to alert management.

6 steps

How to Configure SSL/TLS for Your Web Server

A comprehensive guide to configuring TLS on your web server with the right protocol versions, cipher suites, certificate chain, and security headers.

7 steps

How to Implement a 3-2-1 Backup Strategy

Implement the industry-standard 3-2-1 backup strategy to protect your business data against hardware failure, ransomware, and natural disasters.

6 steps

How to Create a Cybersecurity Policy

Create a cybersecurity policy that defines acceptable behavior, access controls, data handling requirements, and accountability for every employee in your organization.

6 steps

How to Conduct a Cybersecurity Risk Assessment

A step-by-step methodology for conducting a cybersecurity risk assessment that identifies your critical assets, threats, vulnerabilities, and produces a prioritized risk register.

6 steps

How to Prepare for a Cyber Insurance Application

A practical checklist to prepare your organization for a cyber insurance application by implementing the security controls that underwriters now require.

6 steps

How to Respond to a Data Breach

A step-by-step breach response playbook covering immediate containment, forensic investigation, regulatory notification, and recovery procedures.

7 steps

How to Set Up an Organization-Wide Password Manager

A complete guide to selecting, configuring, and rolling out an enterprise password manager to eliminate password reuse and strengthen credential security.

6 steps

How to Train Employees on Cybersecurity

Design and implement a security awareness training program that measurably reduces human risk through phishing simulations, role-based education, and continuous reinforcement.

6 steps

How to Secure Remote Work for Your Team

A practical checklist for securing remote work environments including VPN configuration, endpoint hardening, access controls, and secure communication policies.

6 steps

How to Evaluate a Managed Security Service Provider

A structured framework for evaluating and selecting a managed security service provider that matches your organization size, budget, and risk profile.

6 steps

How to Prepare for a SOC 2 Audit

A comprehensive checklist to prepare your organization for a SOC 2 Type II audit, covering trust service criteria selection, control implementation, and evidence collection.

6 steps

Get your Cyber Defense Score™ in 60 seconds.

See where you stand before implementing any changes.

Get My Cyber Defense Score™ →