Awareness
ChatGPT
Cyber Articles
Tech Layoffs
WFH
More Articles
Threat + Vulnerability + Risk = Exploit
A ‘best practice’ is to prioritize your cyber security time and efforts, such as prioritizing issues that may arise. There are many ways of categorizing vulnerabilities such as by Critical, High, Medium, et cetera and the Common Vulnerability Scoring System [CVSS] rating numbers. In order…
Work From Home
Rather than fighting the move to long-term remote work post-COVID, these companies have embraced the opportunity it provides to cut costs and increase employee satisfaction and productivity. Here are some of the companies listed out of over 60+ companies that are WFH: You can see…
InfoSec vs CyberSec
There are many debates and discussions on this topic. There are those that only use the term “Information Security” or InfoSec to encompass all, and those that specifically use the term “Cyber Security” or CyberSec to differentiate their responsibilities. INFORMATION SECURITY Information Security analysts have…
Virtual Private Network
A Virtual Private Network [VPN] is a method in which to connect to the internet privately & securely while encrypting your internet traffic to protect your online identity. There are 2 types of VPN: Personal & Corporate. PERSONAL CORPORATE Designed for personal use and anonymity.…
Cyber Security Awareness
Security Awareness is about enlightening end users regarding their roles and responsibilities in relation to Cyber Security [CyberSec] policies, procedures, guidelines, and best practices in order to protect assets and data. Security Awareness Training can vary from email phishing simulations to online courses that are…
Wi-Fi Basics
Wi-Fi is a wireless network that follows specific 802.11 IEEE standards and protocols used for Local Area Network [LAN] devices and internet access allowing the exchange of encrypted data via radio waves. The standard home equipment required is a Wireless Router. It uses a Service…