The Social Dilemma
0People who know me, know not to get me started on the dangers of using the internet. If you do make that mistake, you’ll get a...
People who know me, know not to get me started on the dangers of using the internet. If you do make that mistake, you’ll get a...
It’s true, I’m no fan of Microsoft. Perhaps it’s the tactics they use to do business. Certainly it’s the invasion of user privacy they perpetrate with...
There are few things as important in cybersecurity as the involvement of upper management. If the C level executives aren’t involved or don’t see the point,...
In case you lived under a rock the past few years: ransomware or cryptolockers are a form of digital extortion. A malicious program runs on your...
The following is just a top 10 list of signs you work in IT security. It’s intended to be funny, not be used as guidelines for...
If you’re anything like me, you like to take notes. Whether it’s in a work meeting, a post idea for my blog or a simple shopping...