The Dark Side of Smart Cities Listen to Felicia's podcast episode Your browser does not support the audio element. Dark side of smart cities https://www.axis.com/blog/secure-insights/what-smart-city A clothing line designed to dis... Cybersecurity Data Privacy Aug 10, 2023
Understanding fileless ransomware and mitigation techniques Listen to Felicia's podcast episode Your browser does not support the audio element. Fileless Ransomware Ransomware and malware in general is harder to detect and defend against than ever before. Unde... Cybersecurity Security Strategy Aug 9, 2023
Criminal Fraud in IT Listen to Felicia's podcast episode Your browser does not support the audio element. Learn from the mistakes of others in order to prevent being the victim of criminal fraud in IT. Real life example o... Best Practices Cybersecurity Vendor Risk Management Aug 9, 2023
How to secure your backups from ransomware Listen to Felicia's podcast episode Your browser does not support the audio element. PETYA crypto ransomware overwrites MBR http://blog.trendmicro.com/trendlabs-security-intelligence/petya-crypto-rans... Backups Cybersecurity Ransomware Aug 9, 2023
Understanding Security Appliances What is a security appliance A security appliance is a device that protects the perimeter and the inside of your network. The perimeter is secured because the security appliance is between the interne... Cybersecurity Firewall Hardware Router Aug 8, 2023
Why We Must Block Advertisements Blocking advertisements specifically and by category can save your computer from getting infected or otherwise hacked. I have been talking about this fact for years and have been actively blocking adv... Best Practices Cybersecurity Data Privacy Aug 8, 2023
Computer Security & Maintenance Self-Assessment The following is a computer systems security and maintenance self-assessment that organizations of all sizes can use to test their overall security strategy. Most of this list is also applicable to re... Assessment Cybersecurity Aug 8, 2023
Security Awareness Training 101: Which Employees Need It? It’s a fact that people are the weakest link in any organization’s cybersecurity efforts. While awareness training is a necessity, it needs to take into consideration different levels of personnel fro... Awareness Cybersecurity Data Breach Phishing Security Training Jun 28, 2023
Minimizing IP Theft and Insider Threats During Times of Layoffs Employees that have been laid off or let go could pose as a threat risk for intellectual property. With a range of motivations, from ownership of work to replicating files at a future job, serious dam... Cybersecurity IP Theft Insider Threats Layoffs Jun 28, 2023
9 NSA Best Practices for Securing Your Home Network In today's world, technology is ubiquitous, and connectivity is a must. Securing your home network has become more critical than ever. A secure home network is essential for protecting your personal d... Best Practices Cybersecurity Home Network NSA Jun 28, 2023