Tainted
With 7 cyanide deaths, “the times” changed. I was 10 and terrified. The word “tainted” permeated the culture, probably borrowed from the song Tainted Love, released by Soft Cell the year before.
With 7 cyanide deaths, “the times” changed. I was 10 and terrified. The word “tainted” permeated the culture, probably borrowed from the song Tainted Love, released by Soft Cell the year before.
HR’s going to own part of cybersecurity.
Because it’s you who’ll help make it happen, if it’s going to happen. (It needs to) The human behaviors that come with cybersecurity culture, from onboarding to the values professed by the organization.
Dear HR Professionals Read More »
Tell me about your soft skills, my technical friends.
I like the term social skills better. What skills does each person need to bring to the working world? What others make a person a stronger worker and colleague but can be learned and added later?
Soft Skills for Technical People Read More »
Scams. Hackers. Ransomware.
Own the news everywhere!
Massive doom, deep despair!
Cyber headline, scare, scare!
Cyber Hygiene Poetry and Hope Read More »
What if https://www.something.com was the most trusted website in the world. What would you think of… heather.something.combuymystuff.something.com The heather.something and buymystuff.com are subdomains. Large companies often have a lot of subdomains mapped to various IP addresses via DNS. What does this mean? It means they may not have a good handle of all of the subdomains you use. Would you miss one if someone stole a subdomain out from under you? Goooooood question. https://hackernoon.com/how-hackers-attack-subdomains-and-how-to-protect-them-rc7j37f2 With some searching and discovery,
Subdomain Hijacking and Trust Read More »
I made a QR Code for this page. Is that how you got here? Ah, the QR Code – short for “Quick Response.” These were all the rage a few years back, and the pandemic made them highly operational again. There’s a business card service that’ll give someone your full contact info from a QR code. Handy! Restaurant menus. Presentations with the speaker’s details shown on a giant QR code on screen – you’ve probably
QR Codes and Security – Convenient…or Really Dangerous? Read More »
What can you buy for $4? Nowadays, Starbucks lovers average $4 – $5 for coffee type treats. In the 90s, if you wanted pizza and favored Pizza Hut, they would give you quite a deal. Buy one pizza for regular price, and you could get up to four – 4! – additional pizzas for 4 bucks each. The ads informed you “Regular Price, 4 bucks, 4 bucks, 4 bucks, 4 bucks!” I clearly have good memories of this deal.
This limited time of the Pizza Hut deal has come and gone, so I’m going to pull the pizza out of the box, set it aside, and ask the question again, having already addressed the Starbuck’s angle. What CAN you buy for $4?
Manage basic personal cybersecurity for $4 Read More »
If you’re of a certain age, you remember Toothopolis and the Cavity Creeps courtesy of a series of commercials for Crest Gel. The animated city walls of Toothopolis were, of course, comprised of tall, perfect, gleaming white teeth. The Cavity Creeps arrived underwater alongside ominous music and were depicted as muscular villains brandishing pickaxes and chipping away at the tooth city walls screaming “DECAY!” Hackers are rarely as obvious as Cavity Creeps, but a strong
Be a Cybersecurity Advocate in Your Organization Read More »
Jab. Jab, cross, hook, cross. Jab. Jab. Jab. Dance. Jab. Or, Boxing Day – a time of recovery and storage (or return) of gifts. Boxes. Uline, UHaul , UPS. U Box? A box is a type of a container, and containers help us define our expectations so we can work with a framework and include others. Boxes are necessary. But…”the box” has a bad rep; just ask all of the quotes begging you to abandon
The Art of the Box Read More »