October is the month to carve pumpkins, pick out Halloween costumes, and curl up with some scary movies. But there’s something even scarier than ghouls or vampirescyberattacks—and all the garlic in the world can’t protect you from cybersecurity attack. For that reason, October isn’t just about celebrating Halloween; it’s also about learning and implementing cybersecurity best practices. And in the spirit of cybersecurity awareness monthOnepath has compiled a Master List of our best cybersecurity articles.  

If you want tips for avoiding a breach, check out our list. And if you need articles about recovering from a breach, we have those, too. From MFA to SSO and cybersecurity training, learn about the technology and best practices that can protect your company from serious risks down the line. And check back daily for more links from our vault (and entirely new articles about cybersecurity maturity, specific threats, and more!). 


Ways to Avoid a Breach 

Preventing a breach entirely is always the goal. That’s why the following articles focus on ways to fortify your organization and protect your information. From email best practices to workplace security, these articles focus on active measures you can take to be cyber-secure.  


Recovering from a Breach 

Sometimes, something as simple as clicking the wrong link or letting the wrong person into your building can result in a breach. While this situation is never ideal, a quick, targeted response can mitigate damage and restore information. The following articles tackle ways to respond to cybersecurity breaches 


Business Continuity 

Business continuity plans can protect your business after all kinds of disruptions, including cybersecurity attacks. By having a timeline and knowing what to prioritize, you can save your business time and money while better protecting your assets.   


Cyber Insurance 

Cyber insurance can’t stop a breach, but it can help protect assets in the unfortunate event that one transpires. There’s no standardized version of cyber insurance, so make sure you’re familiar with the different options and what they provide.  


What are the Different Types of Cybersecurity Events? 

Coming soon! 


Compliance Issues and Cybersecurity 

Coming soon! 


Cybersecurity Maturity 

Coming soon! 


The survivors at the end of a horror movie usually know a thing or two about fighting monsters. Sure, some of them last thanks to dumb luck or plot armor, but the majority need to learn how to kill a zombie or exorcise a ghost. Similarly, you can’t stop a cybersecurity threat without being well-informed. So, consider this your monster manual to fighting cybersecurity attacks. And remember to check back for more links throughout cybersecurity awareness month!