2022's best place for Cybersecurity Insights and Advice for Everyone

Find What You're Looking For

What is a Drive By Download?

What is a Drive By Download?

A "drive by download" is a cyber attack where visiting a website or hovering over an Ad causes malware to infect your computer or device.

What is Spear Phishing?

What is Spear Phishing?

Spear phishing is a targeted cyberattack to steal your information. You should be aware of the dangers of this and how to address them.

Why every small and medium business needs a cybersecurity strategy

Why every small and medium business needs a cybersecurity strategy

A truck full of security studies show nearly every small businesses has exposed data and poor cybersecurity policies. Either build and execute a cybersecurity strategy or expect to be a victim of cyber crime. Be prepared, be proactive, and be safe.

What is a WPA2 Password

What is a WPA2 Password

Your Wi-Fi password is the network security pass you use to connect to your home network. This password is important because it protects your system from intruders.

14 Ways to Secure Your Home Wireless Network

14 Ways to Secure Your Home Wireless Network

Many homeowners are just unaware of the security threats that a wireless network might provide if not adequately safeguarded by a secure Wi-Fi network. We would never leave our house's front door unlocked. So you should do the same and never leave your Wi-Fi networks unprotected since it exposes you to the same or even worse threats.

A Step-by-Step Process for Creating an SMB Cybersecurity Plan

A Step-by-Step Process for Creating an SMB Cybersecurity Plan

Failing to plan is a plan to fail. The vulnerability of your small business's digital infrastructure is dramatically increased without a sound cyber security plan. Business plans help achieve desirable outcomes. You don't want to be a cyber attack victim, so build a plan.

What is a Trojan Horse?

What is a Trojan Horse?

Trojan horse computer viruses are malware disguised as or hidden in legitimate software. Hidden from view and ready to attack.

What is a certificate authority CA and what do they do?

What is a certificate authority CA and what do they do?

Certificate authorities are the guardians of digital identity. They come in both public and private capacities. Certificates issued by them are trusted because information are validated from the requester’s own records and/or from third party sources. 

What is a Keylogger?

What is a Keylogger?

Keylogger is a digital surveillance tool. They can track every click, touch, key stroke, download and conversation carried out on the device they are installed on

What is a Back Door Threat?

What is a Back Door Threat?

In cybersecurity, a Back Door Threat enables a hacker to gain unauthorized access to a computer or digital device at any time.

What is DNS Hijacking?

What is DNS Hijacking?

DNS hijacking is no laughing matter. It is a serious security threat that is consuming the cyber world. The critical role of DNS for network security has made a primary target for facilitating mass data theft.

What is Hacking?

What is Hacking?

Hacking is an old game in the cyberworld with ever changing players and techniques. It may be done with good intentions or malicious motives. It is growing rapidly because of the proliferation of devices.