When I first began my CyberSec program, it took me about a month to really catch the bug to want to learn. Maybe it had something to do with transitioning to being back in school after so long. Or perhaps it was because I felt a little (read: a LOT) out of my comfort zone […]
Today is the second Monday of Reblog Mondays and the third day of 12 days of Christmas cybersecurity! For today’s reblog, I’d like to branch out a little into the discussion of ethics in the field of cybersecurity.
The holidays should be a happy time. Friends and families gather to give thanks and show their love and appreciation for each other. Unfortunately, however, it’s one of the seasons when scammers are most active. So how can you protect yourself from cyber attacks this holiday season?
Today is the first of December and since this is a brand new blog, I would like to spend this holiday season giving you, my readers, plenty of new content to check out on the page.
The holidays are here! I am a total nut when it comes to the holidays, especially Thanksgiving and Christmas. I love the get-togethers, gift-giving (and receiving), the whole shebang. But… what I don’t love about the holidays? How active the black hats get online. So be sure to follow these steps to keep yourself safe […]
What is PII? PII stands for Personally Identifying Information. Personally identifying information refers to any information that can be used to identify an individual person on paper or online.
Welcome to the first episode of Reblog Mondays! For today’s post, I want to share a very thorough post on what cryptography is as well as a how-to on using different types of ciphers and codes! CryptoKait has made me want to grab an old notebook and draft up some fun secret messages.
With online shopping and smartphone use at an all-time high, it is imperative that consumers keep our online identities secure from prying eyes. And it’s perhaps even more important for the e-merchants and bloggers out there reading this blog post to increase your online security, since you are responsible for securing the information your users […]