
Recent Scams Feb 2019
Picture from a recent scam email. Email scammers have been around since the early ages of the internet. Every year new types of scams...


Hacked or Spoofed?
Do you know the difference? You may have seen a friend request on Facebook from someone you know and had thought you were already friends...

Does Security Awareness Work?
According to the Verizon 2018 Data Breach Report, 93% of data breaches are linked to phishing or social engineering. With stats like...


Default Security Settings, What Needs to Change?
Today, news agencies and outlets are reporting Information Technology (IT) breaches and loss of protected data at alarming rates. The...


Protect Yourself from Internet Dangers
Protect yourself from Internet Dangers. Learn how to protect yourself at home and at work from the dangers of the Internet, including...

Five Challenges of Computer Security
A Paper I wrote for American Military University, Criminal Justice Department Introduction After a recent lecture on information systems...