Cyber crook graphic

Another Day, Another Data Breach

Yes indeed. I have been involved in multiple data compromises; Target, Home Depot, Retirement system, Equifax, Blue Cross/Blue Shield are ones I can...

Two-factor/multi-factor authentication graphic

Comparing MFA Methods: Which One Fits Your Security Needs?

Multi-factor and 2 factor authentication methods were introduced as an additional security measure to protect a user's login. A user will typically...

Vacation Dreams to Nightmare? Stay Safe!

Online booking platforms have become popular for travelers seeking vacation deals for accommodations, flights and car rentals. It's important to recognize that this...

Cybersecurity banner

Building Cyber Resilience

Cyber threats are an everyday menace for organizations. It requires significant investments and resources to safeguard the environment; protecting assets, data and people....

Kids online

The Human Firewall

Cybersecurity fortification goes beyond the hardware and tools. Building a positive, defensive culture within the organization is a vital part of an overall...

Ransomware graphic

Encrypting Files for Evil

Data encryption is important in helping protect confidentiality and integrity of the data. This form of cryptography will take plaintext and transform it...

Cybersecurity blog - two-factor authentication

Oops! Your Passwords Are Showing

Passwords are important to keep accounts private and secure. Keep in mind that you should follow security best practices when using passwords.

Behind the Square

Quick Response (QR) codes have become common place in advertising and communication. Once requiring a special QR code reader, these codes can easily...

Membership banner - K-12

Choosing Your Cyber Attack Recovery Site

Having an area where recovery operations can function can sometimes be an important element in recuperation from a cybersecurity incident. There are 3...

Ethical Use of Personal Attributes in AI Technology

Artificial Intelligence collects data from multiple resources in order to create new content. Some of the data may be collected without informed consent....

E-rate Training Schedule banner

Verizon 2024 Data Breach Investigation Report

Verizon's annual Data Breach Investigation Report (DBIR) is out! Now in its seventeenth year, the Verizon DBIR is trusted and respected in cybersecurity...

Cybersecurity banner

Secure by Design

Cybersecurity is hard. Unsecure technology can lead to vulnerabilities that can threaten a network, data and users. Controls are put in place using...

World Password Day graphic

World Password Day - May 2, 2024

In 2005, security researcher Mark Burnett, encouraged the creation of a 'password day' in hopes that users would update their passwords on an...

Two-factor/multi-factor authentication graphic

2FA, MFA, Tokens and Codes

Having multiple forms of authentication can help to keep your accounts safe. This extra layer of security, in addition to having a strong...

Phishing graphic

Hook, Line and Sinker. Opening the Phishing Box.

Phishing-Phishing is a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware....

Social media graphic

Choose How You Cruise

Web browsers are fundamental tools for navigating the Internet for information and resources. It's important to understand the security components of the browser...

Virus cybersecurity banner

Tech Support Scams

You are browsing websites, checking out the headlines, shopping or catching up on social media. Suddenly you are presented with a screen that...

Ransomware graphic

Honor Among Thieves

Is there such a thing? This phrase suggests that crooks trust each other. They will not steal from each other. When it comes...

Pi Hole DNS ad blaocking

How To Configure a Raspberry Pi as an Ad-Blocker

In this in-depth Pi Day project spotlight, I’ll walk you through the steps to turn a Raspberry Pi into an ad-blocking DNS server...

Artificial Intelligence and the Criminal Mind

The hype of artificial intelligence (AI) has caused excitement and fear. Various AI tools can be used to create audio, video, written content,...