As a consumer, a high-quality VPN is good for privacy (assuming your VPN provider isn’t selling your web browsing history) and circumventing content licensing restrictions (ex: watching UK-only content in…
Because new/small companies have limited resources, here’s your 4-point plan: Accept that you are a target online and people will try to steal your money. Do not use your admin…
All public WiFi has this in common: It’s someone else’s network, and you can’t easily know whether it’s safe or not. Are the network devices configured correctly? Are they up-to-date…
There is one reliable way you could detect cyber attackers who “silently” compromise your computer. But it requires preparation. And, there is an ongoing administrative burden. It’s called “file integrity…
I was recently asked, “What and how should I properly learn to get into cybersecurity? I have no sysadmin experience and I just started work as a junior web (PHP)…
By mitigate, I assume you mean a company experienced a data breach and now wants to prevent it from happening again. The first step is to make a preliminary mitigation…
Yes. Corporations must make the very best use of their limited budget to manage the limitless number of cyber risks that face them. Your advanced knowledge of finance could help…
It’s fun in the sense that there are always new things to learn, both practical and conceptual. That appeals to me because I consider myself to be an “infinite learner.”…
Here are five serious, high-profile cyber incidents that you can read about: Stuxnet – Wikipedia Everything We Know About Ukraine’s Power Plant Hack Sony Pictures hack – Wikipedia The Untold…
One of the first mobile apps from a third-party to launch on the iPhone was Fandango, a service that allows you to buy movie tickets from your phone. Simple, useful,…