Conducting both business meetings and education via video conference has become the new normal. With the…
Author: Jonathan N. Winters
Freeze Your Credit Prevent Identity Theft
Data breaches hit a record high in 2021. Often the goal of a data breach is…
Determine Safest Time To Visit a Location using Google Maps
In the time of COVID or any other contagious health crisis, it is important to avoid…
Cease and Desist: Public Network Port Forwarding
Many businesses, non-profit organizations and universities, across the planet, have networked IoT (Internet of Things) devices…
Spear Phishing – Increasingly Common
What is Spear Phishing? Spear Phishing is an attack technique in which an attacker crafts an…
backup, Backup, BACKUP! Take 2
The Problem One of my personal mantras is, backup, Backup, BACKUP! Commonly, many individuals, organizations, and…
Case in Point – Stumbling upon three simple No-No’s
Yesterday, I was assisting a new client who was moving into a new office space. In…
What is Information Security and Cyber Security?
The process and methodologies used to protect data and information in all forms, such as print,…
Backup Backup Backup!
We all should recite this little chant until we are blue in the face and get…