What Is Symmetric Encryption? [VIDEO]
Symmetric Encryption is an algorithm that uses the same secret key to both encrypt and decrypt plaintext into ciphertext….
Escaping Traditional Cyber Security Awareness Training
One of the apparent challenges many have with today’s methods of learning is literally consuming the same material without flair or consequences. In hindsight, I can see where that would be an issue.
Hacker Attempts To Poison Florida Water Supply
Last week it was reported that a Florida metropolitan water plant was a victim of a cyber attack. The threat actor reportedly accessed the water plant’s supervisory control and data acquisition or SCADA…
Sage N Clements on Insurance Requirements
A friend of mine ask me to be a guest host on their inaugural podcast to talk about Cyber Insurance and Information Security. I could not hesitate to help him out….
Cyber Security Awareness Month – Suspicious Emails
As you may know, October is Cyber Security Awareness month. Being an IT Security Professional, I wanted to use this month to provide a series of posts that provide tricks and tips on how to better protect yourself…
How I Studied And Passed The CISSP Exam in 2020
Everyone has heard the stories of how tough the Certified Information Systems Security Professional (CISSP) examination is. It’s been described as taxing, mind-blowing and hard to pass. In fact, in many tech circles,
The Case To Ban TikTok In 2020
In recent weeks, reports from the IT Security community have surfaced that a popular short-form video app, called Tiktok may be collecting excessive and potentially unusual user data. A user by the name of…
How to do Virtual Conferences The Right Way
Today marks the first time I have attended a virtual industry conference and I must say it’s bittersweet. On one end, I always find myself increasingly nervous when I attend these events in person…
Facebook Account Hacked and How to Recover
Last week, one of our community members was unable to log into his Facebook account. As he attempted to reset his password to gain access to the account, Facebook was no longer recognizing the recovery email address.
Making Security Awareness Training Effective
The consensus among most security professionals is that either traditional training methods do not work or that company officers do not value the needs of such training. Although I do believe that both have merit, the latter of the two has improved in the last three years, primarily due to some high profile public breaches.