Blog
2FA, MFA, Tokens and Codes
Having multiple forms of authentication can help to keep your accounts safe. This extra layer of security, in addition to having a strong...
Hook, Line and Sinker. Opening the Phishing Box.
Phishing-Phishing is a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware....
Choose How You Cruise
Web browsers are fundamental tools for navigating the Internet for information and resources. It's important to understand the security components of the browser...
Tech Support Scams
You are browsing websites, checking out the headlines, shopping or catching up on social media. Suddenly you are presented with a screen that...
Honor Among Thieves
Is there such a thing? This phrase suggests that crooks trust each other. They will not steal from each other. When it comes...
How To Configure a Raspberry Pi as an Ad-Blocker
In this in-depth Pi Day project spotlight, I’ll walk you through the steps to turn a Raspberry Pi into an ad-blocking DNS server...
Artificial Intelligence and the Criminal Mind
The hype of artificial intelligence (AI) has caused excitement and fear. Various AI tools can be used to create audio, video, written content,...
I Always Feel Like Somebody's Watching Me
That catchy tune by Rockwell is applicable in today's society. Social media and other online presences allow for Open Source Intelligence (OSINT)...
AI Bloopers
Can Artificial Intelligence results be wrong? Unfortunately machine learning and algorithms are lacking some human interventions to provide accurate and factual data. There...
Why? Because I Said So!
Security is hard, right? So many restrictions! Passwords, MFA, content filtering, app restrictions, screen lock outs, etc. Why do I need to have...
Will You Be Mine?
Valentine's Day is a time for romance. Many will celebrate with exquisite dinners and gifts. Others prefer a simpler way to express their...
Cyber Sentry: Tracing the Evolution of Cyber Defenses
The term 'cybersecurity' has become a part of our everyday vernacular. Cybersecurity refers to frameworks, tools and practices to keep technology systems and...
How to Meet and Maintain Your Cyber Risk Insurance Requirements
Cyber attacks can be detrimental to an organization if not proactively addressed. Attacks can be disruptive and costly. There is a chance of...
Data Privacy Date - January 28!
This year’s theme is “Take Control of Your Data”! One of the areas that is overlooked is deleting data no longer required to...
Cybersecurity Frameworks-One Size Fits All?
A cybersecurity framework can assist with cybersecurity risk management by establishing a set of guidelines, standards and best practices. The purpose of describing...
Is the Internet Stalking You?
Having Internet resources readily available 24/7/365 has become a way of life. We use social media to keep up with family, friends, and...
Got New Toys?
Did the holiday season gift you with new tech gadgets? How fun! Upgrading technology is always fun but can also be challenging in...
New Year, New Shield
As we close out this year and enter into 2024 we tend to make resolutions. This is an opportunity to set intentions for...
Cash, Credit, Debit or NFC?
We are spending money almost daily. There are so many methods of payment for our purchases. You may be using a variety of...
Secure Cart: Navigating the Online Shopping Maze Securely
Don't let the Cyber Grinch steal your holidays. Stay vigilant and follow these safe online shopping tips:
- Use...