Category Archives: Uncategorized

Grammar Undercuts Cyber Security When Using Long Computer Passwords

Certain long computer passwords may not provide as much cyber security as previously thought. A new study reports that passwords based on grammatical structure give away vital clues that make them more vulnerable to being cracked. Researchers at Carnegie Mellon … Continue reading

Posted in Uncategorized | Tagged , , , , , , | Leave a comment

Your Social Media Is Being Attacked! (Part 2)

In our last article, we talked about how having a social media account can leave you exposed to potential hacks from cybercriminals who are looking to take advantage of your friends and followers for scams and spam. Now, let’s examine how the material you post online can be used against you by these same cybercriminals. Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Uncategorized | Tagged , , , | Leave a comment

Your Social Media Is Being Attacked! (Part 1)

In this first of two articles, we will take a look at how your social media can be used by hackers and why it is so vulnerable. Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Uncategorized | Tagged , , , , | Leave a comment

What To Do When You’ve Been Hacked?

It is imperative that you know exactly how to deal with a cyber security hack attack on your system. Having a plan in place ahead of time will prevent fumbling and confusion in the event that a hack does take place. Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Uncategorized | Tagged , , | Leave a comment

Hackers and Tax Scams

It’s tax season again and as millions of Americans rush to their computers to get those last-minute returns in, hackers around the world are looking to cash in as well.  Those who are too hasty in trying to get those … Continue reading

Posted in Uncategorized | Leave a comment

Is Bringing Your Device to Work a Good Idea?

Personal laptops, smart-phones, and tablets are becoming quite common in corporate America, making for headaches for IT departments who have to contend with new issues that would have been unheard of before. Here are some issues that must be addressed as companies examine developing a Bring Your Own Device policy. Continue reading

Posted in Cyber security, IT and Computer Security, Smart Phone Hacking, Uncategorized | Tagged , , , | Leave a comment

IT Security Jobs — High Demand, Low Supply

Recent reports show that supply for the high demand IT Cyber security jobs needed for business today is simply not there. We explore this in our latest blog. Continue reading

Posted in Cyber security, Ethical Hacking, IT and Computer Security, Security Certification, Training and Education, Uncategorized | Tagged , , , , | Leave a comment

Tips for Finding Qualified Penetration Testers for Your Website

Here are some tips for finding a good, qualified penetration tester or white hat hacker. Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, IT and Computer Security, Security Certification, Uncategorized | Tagged , , | Leave a comment

Top Ethical Hacking Books

How does a security specialist learn the tricks of hackers? Fortunately, there are several books available which provide guidance on how to be a “white hat hacker” so as to secure your own computer network. Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, IT and Computer Security, Security Certification, Training and Education, Uncategorized | Leave a comment

Do Movies Make Hacking Seem Glamorous?

While we have previously blogged about CISSP movie concepts, the fact is that many of the depictions of hackers in film tend to go towards extremes Continue reading

Posted in Hacking, IT and Computer Security, Uncategorized | Tagged , , , , , | Leave a comment