The media is a social force that shapes our attitudes and practices surrounding cybersecurity. The Media can both positive and negatively influence our understanding of Cybersecurity. Starting with the positive some feature films and television shows use real world cybersecurity… Continue Reading →
“Another awareness training…” Organizations should implement frequent human factors trainings to shape and mold your associate attitudes towards cybersecurity and the human impact on cyberattacks. Francesca Ussani (WMIT), CC BY-SA 4.0 https://creativecommons.org/licenses/by-sa/4.0, via Wikimedia Commons “When you are laid off,… Continue Reading →
Fake websites heavily contribute to cyberattacks such as phishing and malware attacks. It is important that we educate and arm ourselves with tools on how to identify a fake website. Clicking on a fake website can cost individuals their identities,… Continue Reading →
Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization by Jurjen Jansen & Rutger Leukfeldt provides a deep dive analysis on the characteristic and behaviors of online banking customers leading… Continue Reading →
Money– Money makes the world go round. Money is how we maintain our basic needs such as food, shelter, and water. Thirty percent of cybercriminals spend their money on converting it to items that keep their value. The idea of… Continue Reading →
Maslow’s Hierarchy of need is the theory that as our simplest needs are met, we shift focus towards more complex higher-level needs. As the internet and technology become more integrated into my day to day, it aids in meeting my… Continue Reading →
PrivacyRights.org has a ton of information regarding data breaches and privacy laws. A breach is a security violation, which leads to sensitive information being duplicated, viewed, transferred, or stolen by an unauthorized user. The information provided on breaches can be… Continue Reading →
Science and Cyber Security are closely related in the sense of the research methods used to answer a question or solve a problem. Just as evolutionist prosed questions the more humans evolved, as the internet evolves, we are prosing more… Continue Reading →
© 2025 My Cyber Security Journey — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑