Doxing is one of those new terms that have evolved with the information age. It comes from a combination of the words “dropping” and “documents” (or “docs” for short) meaning to release information about someone. Basically, it’s just another form of cyber crime. Doxing is clearly something that can affect anyone because of the ease […]
Doxing to Swatting, Cyber Crime Techniques to Understand
Doxing is one of those new terms that have evolved with the information age. It comes from a combination of the words “dropping” and “documents” (or “docs” for short), which means to release information about someone. Basically, it’s just another form of cyber crime. The most recent example was May 11, 2021, when the personal […]
REVIEW: Cybersecurity and Cyberwar: What Everyone Needs to Know
Broken down into easy-to-understand stories and language, cyber security is explained in a way that is relevant to everyone. Though published in 2014, the message that cyber security affects everyone is still relevant today and maybe even more so given the recent attacks in the headlines from Solar Winds to the Colonial Pipeline Ransomware attack. […]
Scan Safely: Essential Tips for QR Code Security
You’ve likely seen the black-and-white speckled squares more and more over the last few years. You scan them with a smartphone to access services or apps, but are you practicing good QR Code Security? But since the pandemic, restaurants and stores are using them more often in an effort to protect their customers and employees […]
Colonial Pipeline: “This is a cyber cancer”
If you ever wondered if cyber security really mattered to you, the Colonial Pipeline ransomware attack this past week should put those questions to rest. Not only did the cyber attack affect the operation of the gasoline pipeline, unexpected follow-on effects will likely domino in the coming days. Many people are in a panic and […]
REVIEW: Cyber Security Basics: Protect Your Organization by Applying the Fundamentals
Cyber security does not have to be complicated. As a matter of fact, the more complicated, the more vulnerable your network will be. For a small business, county government or anyone who has responsibility for protecting the data and access to their network, this is a good basic primer to explain the fundamentals of cyber […]