If you have ever said this, you’re BEGGING to be hacked!
Want to know what every cyber-criminal hopes you believe? “We’re not important…nobody wants to hack us.” This is the TOP reason why people (companies) get hacked. They dismiss the importance…
Want to know what every cyber-criminal hopes you believe? “We’re not important…nobody wants to hack us.” This is the TOP reason why people (companies) get hacked. They dismiss the importance…
Spotting Fake Linkedin Profiles Fake Linkedin profiles are used by fraudsters and criminals to try and make themselves seem more credible. The more we can can spot these people and…
What is a USB Data Blocker A USB data blocker is a small device the has a male USB connector and a female USB connector that you can plug into…
https://youtu.be/v8BUCVxdoBw Add Your Heading Text Here In the video and audio above I go over a research report that DarkReading.com conducted. It's based on 115 IT and cybersecurity professionals from…
https://youtu.be/Qa9_RW41pbA The More You Know The Safer You Are Phishing emails are rampant on the internet and I love to investigate those emails. The video above shows an investigation I…
Our Founder Josh Interviewed By Dave Crysler This is a chance for you to learn a little more about the philosophy behind our business and the development.Here is a link…
Summary CONTI ransomware originally showed up on the scene December 2019. On July 8th 2020 Carbon Black wrote an an article on the CONTI virus. Based on our observation the…
I am going to explain how to maintain control over your website.TL/DR versionMaintain Contol of Your Domain NameKeep Regular Backups of Your WebsiteHiring a web developer to build your website…
Coffee with a Hacker · In House IT Threat Show Notes: In house IT services are great but don't assume they are not a threat to your business. In house…
You can download the slides here. Edit 07/24/2020: The audio that I added to this presentation is not from my presentation from with Veteran Circle but it is from another…