Thursday, January 22, 2026
spot_img
31 Articles written

Lori Crooks

Lori Crooks is the Founder and CEO of Cadra, a woman-owned cybersecurity compliance firm dedicated to helping small and mid-sized businesses cut through the complexity of audits and regulations. With over two decades of experience in security assessments, policy development, and compliance strategy, Lori is known for translating dense frameworks like FedRAMP, NIST, HIPAA, and SOC into plain English—giving clients the clarity and confidence they need to move forward. Before launching Cadra, Lori led security teams and compliance audits across industries, guiding organizations through ISO gap analyses, policy and procedure development, and third-party assessments. Today, she and her team bring that expertise to growing companies who need big-firm skill without the big-firm red tape. Clients value Lori’s approachable style and steady leadership. Her ability to make complex requirements simple and actionable has helped dozens of organizations go from overwhelmed to audit-ready. Under her guidance, Cadra has become a trusted partner for businesses looking to build strong security foundations, reduce risk, and achieve compliance without the chaos. When she’s not guiding clients through audits, Lori is passionate about building human-centered businesses that balance technical excellence with clarity, care, and a touch of humor.

Latest Articles

Choosing the Right Cybersecurity Solution Provider: A Complete Guide

Choosing the Right Cybersecurity Solution Provider: A Complete Guide In today’s digital world, cybersecurity is no longer optional—it’s essential. As cyber threats become more frequent...

The Critical Role of Security Risk Assessments in Today’s Cyber Landscape

The Critical Role of Security Risk Assessments in Today’s Cyber Landscape As businesses embrace digital transformation, the importance of protecting data and systems from cyber...

Security Audits, Unpacked: An In-Depth Guide

In a world where data is as valuable as any physical asset, strong cybersecurity isn’t optional—it’s essential. One of the pillars of a mature...

Security Audits, Unpacked: An In-Depth Guide

In a world where data is as valuable as any physical asset, strong cybersecurity isn’t optional—it’s essential. One of the pillars of a mature...

What Is an SSP (System Security Plan)—and How Do You Actually Write One?

If you’re anywhere near a FedRAMP authorization, you’ve heard “SSP.” Maybe followed by a sigh. Maybe during a meeting that absolutely could’ve been an...

Tackling the Challenge: Cybersecurity Compliance Services

Cybersecurity compliance is no longer a simple “check-the-box” exercise — it’s a critical foundation for business resilience, credibility, and trust. As organizations navigate an...

Steering Through CMMC Compliance: A Critical Path for Defense Contractors

As cyber threats evolve relentlessly, strong cybersecurity is non-negotiable—especially for defense contractors and others in the DoD supply chain, where safeguarding sensitive data is...

Daily Cybersecurity Tip: Old servers, new risks.

Running outdated server operating systems is like leaving your front door unlocked. Unsupported systems don’t receive security patches and make them prime targets for...

Daily Cybersecurity Tip: Public DNS isn’t always private.

While public DNS resolvers like Google or Cloudflare offer speed and convenience, they can also introduce risks. Your DNS queries may be logged, exposing...

Daily Cybersecurity Tip: Paper trails can be security risks too.

Sensitive documents—like contracts, customer records, or financial reports—should be stored securely, not left on desks, printers or in unlocked cabinets. Shred anything no longer...

Daily Cybersecurity Tip: Not all data is created equal—classify it accordingly.

Sensitive data like customer info, financial records, and employee details deserve tighter controls than public-facing content. Use clear labels (e.g., Confidential, Internal Use Only,...

The Top 5 Cybersecurity Myths That Are Putting You at Risk

October is Cybersecurity Awareness Month—so it’s the perfect time to “correct” some stories that make even the smartest users vulnerable. Let’s break down five...