...

securecubicle

Image of a CEO at her desk

The #1 Cyber Threat CEOs Face: Spear Phishing & How to Avoid It

Let’s say you’re the CEO of a company, you come in to work as usual, take your cup of coffee, sit at your desk, and begin to read your emails. As you scroll through the list, you come across an email that seems completely legit, perhaps from your CFO, a trusted vendor, or even a […]

The #1 Cyber Threat CEOs Face: Spear Phishing & How to Avoid It Read More »

MAYDAY!: The Threat of GPS Jamming in Aviation

Most of us step onto an airplane, knowing very little on how exactly we’re going to get to our destination. We board the plane, hope the pilots didn’t consume any mini bottles of alcohol before they sat in the flight deck, then arrive at our destination. For flights to get to their intended destination, modern

MAYDAY!: The Threat of GPS Jamming in Aviation Read More »

Encryption Apps: What They Are and Why You Should Use Them

When you send a message using your favorite instant messenger app like WhatsApp or Facebook Messenger, have you ever wondered if it’s truly safe from prying eyes? With so many cyber threats out there, from hackers to invasive surveillance, protecting your personal information is more important than ever. Encryption apps provide a simple yet effective

Encryption Apps: What They Are and Why You Should Use Them Read More »

Masquerading Malware: How It Evades Detection and What to Do About It

Just when we thought we had a handle on malware, cybercriminals have presented us with a type of malware that is so much more difficult to deal with.  Masquerading malware is a sophisticated cyber threat that disguises itself as legitimate software to bypass even the most advanced security systems. If you’ve ever wondered how malicious

Masquerading Malware: How It Evades Detection and What to Do About It Read More »

Stop Oversharing! Hackers Are Watching Your Social Media!

I’ll be honest, I was never one who posted a lot about my personal life to social media, but I know many that do. From taking pictures of food at their favorite restaurants, to the places they’re visiting on their vacation, to everything in between, people are fond of sharing intimate details of their lives

Stop Oversharing! Hackers Are Watching Your Social Media! Read More »

Image of Smart speaker giving off sound

Is Your Smart Speaker Spying on You? IoT Security Tips to Stay Safe!

I’m old enough to remember when I wanted to listen to my favorite tunes, I had to insert a CD into a player that was connected to giant speaker boxes. And oh how it sounded amazing. But time waits for no one, and those big, bulky speaker boxes were replaced by much smaller speakers that

Is Your Smart Speaker Spying on You? IoT Security Tips to Stay Safe! Read More »

Google Password Manager: Your Guide to Securing Your Online Accounts

When I started out in this whole computer thing I had only one password to remember, my very first email, and still sometimes I forgot the damn thing, and no, it wasn’t “password”. But as time went on, and I had more and more accounts, so did the number of passwords. I had so many

Google Password Manager: Your Guide to Securing Your Online Accounts Read More »

How to Choose the Best Online Cybersecurity Certification for Your Career Goals

  Long gone are the days when cybersecurity and information security were just a “nice to have”, the fact is, it’s now mandatory. With cyberattacks on the rise, every organization has to have a robust cybersecurity infrastructure and a response plan to protect their data, systems, and networks. This means they’ll be looking for skilled

How to Choose the Best Online Cybersecurity Certification for Your Career Goals Read More »

image of two people on a plane using computers

Stay Safe Abroad: 5 Steps to Protect Your Data While Traveling

While taking a vacation in another country, exploring new cultures and scenery, or being consumed with company work while abroad, the safety of your personal data may not always be foremost on your mind. The truth is, we live in times when our cyber safety is always at risk. You may think that cyber threats

Stay Safe Abroad: 5 Steps to Protect Your Data While Traveling Read More »

Image of cybersecurity instructor teaching company employees

Your Complete Guide to Cybersecurity Training for Employees.

When I used to work in IT departments, one of the most important tasks we were required to perform was to provide the necessary training to new and existing staff on our IT and IT security procedures. And I can tell you, it wasn’t always easy, some were responsive to the training, while others were

Your Complete Guide to Cybersecurity Training for Employees. Read More »

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.