Types of Cyber Attacks

Types of Cyber Attacks

Introduction Cyber criminals gain access to systems, personal information, and accounts mostly through people. The image of a hacker sitting in the dark attempting to crack encrypted data, or steal your password happens primarily in the movies. In most cases, methods...
Email Safety

Email Safety

Introduction Many of the emails we receive each day are spam. Some are dangerous and can cause significant harm, such as identity theft, access to online resources, or loss of money. Therefore, you must be diligent in handling emails and learn to recognize malicious...
Practice Cybersecurity

Practice Cybersecurity

Introduction Cyber threats are constantly increasing, so we must remain diligent in protecting our data and online resources. I have worked in Information technology since the 1980s, and I have seen many problems that could have been avoided, especially within the...
LastPass Password Manager

LastPass Password Manager

Introduction A severe vulnerability of using online resources is passwords. Passwords should be strong, and each online resource should have its own unique password. However, people tend to be lax in following basic best practices for passwords, making them more...
Types of Cyber Attacks

Cyber Protection

Introduction Cyber security is becoming increasingly important as time goes by. I remember my first experience with a virus in the late 1980s or late 1990s. I was building a Novell Netware server and noticed the words on a blank screen that read something like,...
Are You Ready For A Disaster?

Are You Ready For A Disaster?

Introduction Several years ago, I implemented a disaster recovery plan (DR) for a company, which enabled them to do business as usual during a two-week-long power outage in their area. How was that possible? They purchased a cloud-based email and file storage solution...