Establishing a baseline is essential for understanding how the normal flow of business will show on a report. You cannot know what is abnormal without first defining what normal is. Observing traffic for one day is not sufficient data, but… Continue Reading →
The best way to minimize a bad reaction to a lot of change is to teach about the benefits. Harvard Business Review lists 3 things people consider most when change is involved. Difficulty is vital as people would like to know how… Continue Reading →
One of the benefits of SSO is the less use of typing in the same username and passwords on multiple sites or applications. It can limit the number of issues related to password lockouts which reduces the workload of help… Continue Reading →
If law enforcement is not involved in the process of reporting cybercrime then why put our trust in companies? The debate starts as panic can spread when people find that a massive breach has occurred and information is at risk,… Continue Reading →
A threat can be defined as an interpretation or words that convey a vulnerability and a plan to act on it. An attack is an actual attempt to exploit that vulnerability. A threat can be defined as a risk of… Continue Reading →
I would say the biggest risk of IoT is the lack of secure communications and data storage. ITNS Consulting posted an article explaining the 5 biggest threats relating to IoT. One of the items listed is communications. In the article,… Continue Reading →
I believe the main difference between computer security and information security is a matter of what is being protected. Cybersecurity focuses on the technical aspect of data stored in a cloud, on a server, or over a network, etc. Cybersecurity… Continue Reading →
Many inexperienced or uneducated users are not aware of the dangers that lurk online. This can range from suspicious emails about a package never ordered, trying to download or watch free movies online, or simply not protecting their information. These… Continue Reading →
Most cyber-related attacks occur in small businesses or even medium-sized ones. The speculated cause is that most small businesses believe they are an unlikely target. They do not produce many if any cyber protections. This can cause a business to… Continue Reading →
Deviance can be defined by going out of the standards set intentionally. Whether it is societal standards or workplace policies. For example, being late or absent at work is an example of work-related deviance. Cyber-related deviance at work can be… Continue Reading →
Career coachYearly cyber conferences to gather connectionsBusiness Startup your own companyExperience in the fieldResearch a specialty to pursue to stand outSecurity ConsultantEngineer in Security ManagingCompete in events/competitionsUndergo certificationsResearch and developInternal Audit ManagerTraining othersYouTube teaching or showcasing channel
Comparing the difference in the risk between the UK and the US is an intriguing case. While the US ismore prone to attacks and attempts most typically come from inside the country than out. Whilethe data collected is accurate based… Continue Reading →
Network Engineering teaches how a network is put together and includes how to manage the system. While software is included it is not the main focus, but rather on the devices and functions themselves. It gives a background of how… Continue Reading →
© 2025 Jasmyn Wilhelm — Powered by WordPress
Theme by Anders Noren — Up ↑