Hacker Series – In Real Life

hacker

Hacker Series – In Real Life OR…5 Ways To Thwart Physical Hacks I am a hacker. Sure, I prefer to sit in my sweatpants at my computer and steal your data, but sometimes I have to get my hands dirty. Sometimes I have to find a way into your system that doesn’t just involve the […]

Hacker Series – Exit Strategy

hacker

Hacker Series – Exit Strategy OR…5 Ways To Keep Your Insides Inside I am a hacker and I am in your corporate computer network. The great thing about computer networks is all computers in the whole company are connected to every other computer. It’s also the bad thing. Because I was able to gain access […]

Hacker Series – Playing Hard To Get

hacker

Hacker Series – Playing Hard To Get OR…5 Ways To Stop Hackers In Their Tracks I am a hacker. After scouring one million IP addresses in the United States, I compiled a list of plump targets ripe for exploitation. (If you missed part 1, click here). While I wait for the rest of my scans […]

Hacker Series – How I Met Your Data

Hacker Series – How I Met Your Data OR…5 Ways To Keep Hackers Out I am a hacker. Collectively, my friends and I stole, or at least disrupted, several trillion dollars last year to finance physical war, our countries, and ourselves. Who Am I? I am a nameless, faceless person at a keyboard, almost always […]

Cybersecurity Basics – Tech Lords

Cyber Security Tech

Cybersecurity Basics – Tech Lords OR My Other Car is a Police Call Box This three-part series covers the basics of cybersecurity for three different user levels. The final entry speaks to the administrators, the technical gurus that keep data flowing and businesses running. What wisdom can possibly be imparted upon such tech heads that they don’t […]

Cybersecurity Basics – Daily Users

Cybersecurity Lock

Cybersecurity Basics – Daily Users OR Don’t Develop a Case of the Mondays This three-part series covers the basics of cybersecurity for three different user levels. Last week I spoke to the novice. Today’s entry is for daily computer users. You use a computer, tablet, or mobile device for work, school, or home. You can […]

Cybersecurity Basics – Novice

Cyber Security

Cyber Security Basics – Novice OR Grandma’s Got a Brand New Smart Bag This three-part series covers the basics of cybersecurity for three different user levels. The first is the novice technologist – those who wouldn’t use the technology if it wasn’t so darn convenient. The next category is the daily user – you check […]