Got Hacked? Windows Tasks & Processes

Got Hacked? – Windows Task & Processes Finding Indicators of Compromise (IoC) This is the second in a series of blog posts where we dive into our systems to find Indicators of Compromise (IoC). No, not the Olympic committee. These are clues to tell us we have some malicious tasks. It could have been placed […]
Got Hacked? – Windows Registry

Got Hacked? – Windows Registry Finding Indicators of Compromise (IoC) This is the first in a series of blog posts where we dive into our systems to find Indicator of Compromise (IoC). No, not the Olympic committee. These are clues to tell us we have something running malicious. It could have been placed there by […]
Police Beg You To Protect Your Money

Police Beg You To Protect Your Money Financial Crimes Detectives Offer These Tips Detective Jeff Donley and his team work to protect us. They are with the Financial Crimes Division of the Cherokee County Georgia Sheriff’s Department (LinkedIn Link). In a recent presentation, he offered his team’s Top 10 tips to avoid financial scams both […]
5 Positive Cyber Thoughts for 2025

5 Positive Cyber Thoughts for 2025 Breathe and Don’t Worry About A Thing Namaste! Most people start the new year with resolutions to become more organized, eat right, workout, or just be a better human. Too many of these fade away in the first few weeks as reality comes a calling. But I am here […]
Apple Privacy and Security Myths

Apple Privacy and Security Myths Dispelling the Lies of the World’s Largest Tech Company The Bright Red Apple Apple users beware! Remember The Masque of the Red Death by Edgar Allen Poe? Here are the highlights. Prince Prospero used his wealth to hide the nobles of his land inside his stronghold while the rest of […]
10 Tips To Deter Social Engineering

10 Tips To Deter Social Engineering Only You Can Prevent Data Theft Most office spaces were not designed with security in mind. Multiple entry points, open corridors, and networks ports in unprotected areas are difficult to protect. Those with a single entry post a receptionist or operator as a gatekeeper thinking any human will deter […]
Why Try To Hide Online?

Why Try To Hide Online? Don’t Pay For Ineffective Anonymity Programs! Las Vegas is a spectacle of sights, sounds, and entertainment. Can’t hide your enthusiasm. But no trip to Vegas is complete without trying your luck in one of the many casinos that are the foundation of the city, according to the advertising. Anyone can […]
Magic Inside QR Codes

Magic Inside QR Codes The Good, The Bad, and The Hopeful They are everywhere. On television. In the grocery store. At your favorite restaurant. On the bus. In the newspaper. You probably have one within eyesight right now! No, it’s not a cute puppy. I’m talking about QR codes. Denso Wave, a Japanese company, invented […]
It Came From INSIDE The House!

It Came From INSIDE The House! Protect Yourself From Bandwidth Thieves They are everywhere inside your house. All around you, little thieves are hiding in plain sight. You watch them, they watch you, but you don’t even realize they are slowly eating away at…your Internet bandwidth. What did you think I was talking about? Notice […]
Latest Breach Data Tells All

Latest Breach Data Tells All What We Can Learn From Others’ Failures Verizon recently released its 2024 Data Breach Investigations Report. You can find it here (Link). The report covers over 30,000 incidents, of which over 10,000 were deemed actual breaches. To clarify, their percentages do overlap, so don’t roast me when I quote numbers […]