“Another awareness training…” Organizations should implement frequent human factors trainings to shape and mold your associate attitudes towards cybersecurity and the human impact on cyberattacks. Francesca Ussani (WMIT), CC BY-SA 4.0 https://creativecommons.org/licenses/by-sa/4.0, via Wikimedia Commons “When you are laid off,… Continue Reading →
Fake websites heavily contribute to cyberattacks such as phishing and malware attacks. It is important that we educate and arm ourselves with tools on how to identify a fake website. Clicking on a fake website can cost individuals their identities,… Continue Reading →
How has cyber technology created opportunities for workplace deviance? It is important for organizations to protect their proprietary and customer data from the public and potential hackers; but what about your employees? As the workplace becomes increasingly integrated with the… Continue Reading →
Ways to make money in Cybersecurity Create app security software Yellow teaming Buying security stocks Exploit development tester Researcher Startup company Engineering Consultations University professor Remote analyst IT auditing Trainer YouTube video classes
Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization by Jurjen Jansen & Rutger Leukfeldt provides a deep dive analysis on the characteristic and behaviors of online banking customers leading… Continue Reading →
Money– Money makes the world go round. Money is how we maintain our basic needs such as food, shelter, and water. Thirty percent of cybercriminals spend their money on converting it to items that keep their value. The idea of… Continue Reading →
Comparing Cyber Risk between the United States and Nigeria As our lives become increasingly integrated with the internet and technology cyber security is becoming a worldwide problem. There are multiple attacks launched on individuals, governments, and businesses every day. These… Continue Reading →
Maslow’s Hierarchy of need is the theory that as our simplest needs are met, we shift focus towards more complex higher-level needs. As the internet and technology become more integrated into my day to day, it aids in meeting my… Continue Reading →
As the internet becomes more integrated in our daily lives the more, we are storing and transmitting our sensitive information online. Every day million of users are entering their credit card numbers to pay bills, social security numbers for applications,… Continue Reading →
PrivacyRights.org has a ton of information regarding data breaches and privacy laws. A breach is a security violation, which leads to sensitive information being duplicated, viewed, transferred, or stolen by an unauthorized user. The information provided on breaches can be… Continue Reading →
© 2025 My Cyber Security Journey — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑