Got Hacked? Windows Tasks & Processes

Got Hacked? – Windows Task & Processes Finding Indicators of Compromise (IoC) This is the second in a series of blog posts where we dive into our systems to find Indicators of Compromise (IoC). No, not the Olympic committee. These are clues to tell us we have some malicious tasks. It could have been placed […]
Got Hacked? – Windows Registry

Got Hacked? – Windows Registry Finding Indicators of Compromise (IoC) This is the first in a series of blog posts where we dive into our systems to find Indicator of Compromise (IoC). No, not the Olympic committee. These are clues to tell us we have something running malicious. It could have been placed there by […]
What is Quantum Computing?

What Is Quantum Computing? And When Will The Age Of Binary Computing End? What is a Quantum Computer? The primary difference between a quantum computer and the one you’re reading this on is the processor. Today’s processors are Binary, meaning they use Zeros and Ones (0 and 1), on or off, to process data. A […]
Police Beg You To Protect Your Money

Police Beg You To Protect Your Money Financial Crimes Detectives Offer These Tips Detective Jeff Donley and his team work to protect us. They are with the Financial Crimes Division of the Cherokee County Georgia Sheriff’s Department (LinkedIn Link). In a recent presentation, he offered his team’s Top 10 tips to avoid financial scams both […]
5 Positive Cyber Thoughts for 2025

5 Positive Cyber Thoughts for 2025 Breathe and Don’t Worry About A Thing Namaste! Most people start the new year with resolutions to become more organized, eat right, workout, or just be a better human. Too many of these fade away in the first few weeks as reality comes a calling. But I am here […]
5 Lies And Solutions For The Cyber Jobs Market

5 Myths and Solutions for Cyber Jobs Where Are Those 4 Million Open Positions? There are supposedly 4 million open cybersecurity jobs in the US. Four million! That’s according to CyberSeek.org, Forbes, and the US Government. The United States Federal Government alone has 500,000 (Link). Indeed only shows 16,000 jobs (Link) and LinkedIn shows 110,000 […]
Apple Privacy and Security Myths

Apple Privacy and Security Myths Dispelling the Lies of the World’s Largest Tech Company The Bright Red Apple Apple users beware! Remember The Masque of the Red Death by Edgar Allen Poe? Here are the highlights. Prince Prospero used his wealth to hide the nobles of his land inside his stronghold while the rest of […]
10 Tips To Deter Social Engineering

10 Tips To Deter Social Engineering Only You Can Prevent Data Theft Most office spaces were not designed with security in mind. Multiple entry points, open corridors, and networks ports in unprotected areas are difficult to protect. Those with a single entry post a receptionist or operator as a gatekeeper thinking any human will deter […]
Why Try To Hide Online?

Why Try To Hide Online? Don’t Pay For Ineffective Anonymity Programs! Las Vegas is a spectacle of sights, sounds, and entertainment. Can’t hide your enthusiasm. But no trip to Vegas is complete without trying your luck in one of the many casinos that are the foundation of the city, according to the advertising. Anyone can […]
Magic Inside QR Codes

Magic Inside QR Codes The Good, The Bad, and The Hopeful They are everywhere. On television. In the grocery store. At your favorite restaurant. On the bus. In the newspaper. You probably have one within eyesight right now! No, it’s not a cute puppy. I’m talking about QR codes. Denso Wave, a Japanese company, invented […]