Ways to Prevent Zoom Bombing

Conducting both business meetings and education via video conference has become the new normal. With the…

Freeze Your Credit Prevent Identity Theft

Data breaches hit a record high in 2021. Often the goal of a data breach is…

Determine Safest Time To Visit a Location using Google Maps

In the time of COVID or any other contagious health crisis, it is important to avoid…

Cease and Desist: Public Network Port Forwarding

Many businesses, non-profit organizations and universities, across the planet, have networked IoT (Internet of Things) devices…

Spear Phishing – Increasingly Common

What is Spear Phishing? Spear Phishing is an attack technique in which an attacker crafts an…

The Right to Self-Administration vs. Principle of Least Privilege

Small business, college, and non-profit personnel tend to have administrative rights on their work machines. Bad…

backup, Backup, BACKUP! Take 2

The Problem One of my personal mantras is, backup, Backup, BACKUP! Commonly, many individuals, organizations, and…

Case in Point – Stumbling upon three simple No-No’s

Yesterday, I was assisting a new client who was moving into a new office space. In…

What is Information Security and Cyber Security?

The process and methodologies used to protect data and information in all forms, such as print,…

Backup Backup Backup!

We all should recite this little chant until we are blue in the face and get…