By Heath Gieson, CISO / EVP of Operations, Forthright Welcome back to our Cyber Security Action Month series. So far, we’ve talked about enabling Multi-Factor Authentication and auditing your user accounts. This week, we’re turning our attention to something just as foundational—but often overlooked: your company’s end-user computing devices. Let me ask you a simple […]