• Cybersecurity

    Is my computer safe?

    The better question here is “How safe is my computer?”. It has to be noted that a computer is only as safe as the weakest link in it’s defense. Is you computer locked inside a secure compartment with no network connection and a faraday cage surrounds everything like that scene in Enemy of the State? Is it sitting open and unlocked on a table in the public library while you grab that book you need that quote from? You’ll also want to look at the more common sense things like software updates, anti-virus/anti-malware, and firewall as necessary. Having these all provide a degree of safety that should be a baseline…

  • Cybersecurity

    Cybersecurity: Costs and Benefits

    Two of the most influential factors, I feel, when implementing a cyber security system within a business are the costs and benefits. When determining what your costs are going to be, you should first determine your budget. Without knowing how much you can spend, you’re likely to run into spending issues. You also need to know what your risks are. How many assets do you have the need protecting? Are you planning on using WiFi? What assets require an internet connection to function? These are just a few questions that must be asked. Once they’ve been answered, you can determine what you need to purchase. Research should be done to…

  • Uncategorized

    An acrostic for making money in cybersecurity.

    Create cybersecurity blog You provide consulting Build secure networks for companies Engineering Services Rebuild improperly built infrastructure Sensitive network testing Evaluation services Create network security applications Utilize industry best practices at your job Repair old hardware Investigation services Training services YouTube videos about cybersecurity

  • Uncategorized

    How technology is enabling workplace deviance.

    Technology has created numerous opportunities¬†for deviant behavior. Cyberloafing¬†is one of the most prevalent¬†. Employees utilizing company resources to browse the Internet, make phone calls, and chat with friends all while on the clock. Gossip is difficult to quash in the workplace. In the past it has been muttering between coworkers in the break room or in the halls outside offices. Now people don’t even have to leave their office or desk to gossip. In today’s age, people are doing it over email or other messaging service. I asked a few coworkers about this trend and why they thought it this was the method that is happening more and more. The…

  • Cybersecurity

    My cybersecurity degree

    This summer I began my cybersecurity degree. I will use the skills I obtain through my schooling to join a expanding team of cybersecurity professionals that protect today’s digital society. This exciting new chapter in my life comes after spending twelve years in the military. The military taught me a lot of useful skills. The one that will benefit me the most in my pursuit of my degree is how to study. When I complete my degree, I plan to combine my military background with my newly learned cybersecurity skills to get a job in the cybersecurity field. I’ve been using computers since I was child and my first computer…

  • Cybersecurity

    A quick search on me

    In today’s age, gaining information about someone is just a click away. In fifteen minutes, I was able to find out quite a bit about myself. My social media accounts are a given, but I was also able to find possible home addresses, possible phone numbers, and current and past jobs. I’ve done this in the past, and have used what I found to attempt to remove parts of my publicly accessible digital footprint. Unfortunately, some information that is available is just out of my control. I feel it’s important for everyone in today’s society to understand the idea of a digital footprint. Social media allows us to share whatever…