Doxing is one of those new terms that have evolved with the information age. It comes from a combination of the words “dropping” and “documents” (or “docs” for short), which means to release information about someone. Basically, it’s just another form of cyber crime. The most recent example was May 11, 2021, when the personal […]
BOOK REVIEW: Cybersecurity and Cyberwar: What Everyone Needs to Know
Broken down into easy-to-understand stories and language, cybersecurity is explained in a way that is relevant to everyone in “Cybersecurity and Cyberwar.” Though published in 2014, the message that cyber security affects everyone is still relevant today and maybe even more so given the recent attacks in the headlines from Solar Winds to the Colonial […]
QR Code Security: Essential Tips for Scanning Safely
You’ve likely seen the black-and-white speckled squares more and more over the last few years. You scan them with a smartphone to access services or apps, but are you practicing good QR Code Security? However, since the pandemic, restaurants and stores have been using them more frequently to protect their customers and employees from COVID-19. […]
Colonial Pipeline: “This is a cyber cancer”
If you ever wondered if cyber security really mattered to you, the Colonial Pipeline ransomware attack this past week should put those questions to rest. Not only did the cyber attack affect the operation of the gasoline pipeline, unexpected follow-on effects will likely domino in the coming days. Many people are in a panic and […]
BOOK REVIEW: Cyber Security Basics: Protect Your Organization by Applying the Fundamentals
Cyber security does not have to be complicated. The more complex your network is, the more vulnerable it becomes. For a small business, county government, or anyone who has responsibility for protecting the data and access to their network, this is a good basic primer to explain the fundamentals of cybersecurity. Part of this is […]
The Ransomware Horor is Real – 6 Tips to Defeat Cyber Crime!
1. Assume you will be hit with Ransomware. No one is invulnerable to a ransomware attack. Denial is not a defense. It is better to be prepared and not attacked than to be attacked and not prepared. 2. Backup. Backups are the best way to recover your data after an attack (other than paying a […]