Ways to Prevent Zoom Bombing

Conducting both business meetings and education via video conference has become the new normal. With the…

Freeze Your Credit Prevent Identity Theft

Data breaches hit a record high in 2021. Often the goal of a data breach is…

Determine Safest Time To Visit a Location using Google Maps

In the time of COVID or any other contagious health crisis, it is important to avoid…

Cease and Desist: Public Network Port Forwarding

Many businesses, non-profit organizations and universities, across the planet, have networked IoT (Internet of Things) devices…

Spear Phishing – Increasingly Common

What is Spear Phishing? Spear Phishing is an attack technique in which an attacker crafts an…

The Right to Self-Administration vs. Principle of Least Privilege

Small business, college, and non-profit personnel tend to have administrative rights on their work machines. Bad…

Case in Point – Stumbling upon three simple No-No’s

Yesterday, I was assisting a new client who was moving into a new office space. In…

What is Information Security and Cyber Security?

The process and methodologies used to protect data and information in all forms, such as print,…