Insider Risk
Cybersecurity Basics Joshua Means Cybersecurity Basics Joshua Means

Insider Risk

Small businesses are particularly susceptible to insider risk because trust is operationally necessary. Staff often perform multiple roles, access is granted broadly to avoid friction, and responsibilities evolve faster than systems are adjusted to reflect them. Over time, access patterns drift away from necessity and toward convenience. From an evaluative standpoint, that drift is not neutral. It creates conditions where a single mistake, or a single compromised account, can expose far more information than intended.

Read More
Business Email Compromise
Joshua Means Joshua Means

Business Email Compromise

Business email compromise is often treated as a financial fraud problem, distinct from information security incidents. In regulated professional environments, that distinction does not hold. BEC events are typically the downstream result of compromised authentication combined with insufficient authorization controls. The harm arises not merely from deception, but from systems that permit sensitive actions based on email trust alone.

Read More
Phishing is a Control Failure
Joshua Means Joshua Means

Phishing is a Control Failure

Phishing remains one of the most common initial access vectors in security incidents involving small professional practices. Its persistence is often attributed to user inattentiveness or deception. That framing is incomplete. In post-incident analysis, phishing is rarely treated as an isolated user error. It is examined as a control failure that allowed a predictable technique to succeed.

Read More
Authentication vs Authorization
Joshua Means Joshua Means

Authentication vs Authorization

Authentication and authorization are frequently treated as interchangeable, particularly in small professional environments where systems evolve incrementally. That treatment obscures an important distinction. Authentication establishes identity. Authorization constrains action. Failures in either control expose client information, but they do so in materially different ways and are evaluated differently when access decisions are examined after the fact.

Read More
Reasonable Security
Joshua Means Joshua Means

Reasonable Security

“Reasonable security” is a phrase that appears repeatedly in statutes, regulatory guidance, enforcement actions, and judicial opinions. Its imprecision is intentional. Rather than prescribing a fixed set of controls, the standard is designed to be applied contextually, with judgment exercised after an incident has occurred. For regulated professionals, this has a practical implication that is often underappreciated: security decisions are rarely evaluated when they are made, but when they are later reconstructed.

Read More
Importance of Security Controls
Joshua Means Joshua Means

Importance of Security Controls

In regulated professional environments, security controls are not primarily technical artifacts. They are evidence. When a data incident, client complaint, insurance claim, or regulatory inquiry occurs, controls are examined less for their theoretical adequacy than for what they demonstrate about the practitioner’s judgment, awareness, and discipline. The absence of controls is often interpreted not as oversight, but as indifference.

Read More
Basics of Information Security
Joshua Means Joshua Means

Basics of Information Security

For regulated professionals, information security is not meaningfully separable from professional responsibility. The handling of client data—whether financial, medical-adjacent, or otherwise confidential—creates obligations that are ethical, legal, and operational. Within information security, these obligations are commonly evaluated through three principles: confidentiality, integrity, and availability. While frequently described as technical concepts, they function more accurately as evaluative criteria for professional conduct.

Read More