Monthly Archives: July 2021
Do you bring your own device to work?
Bringing your own devices such as your personal smart phone, tablet or laptop to the work place could make you a target for cybercriminals. When used for work, your personal devices contain sensitive information, provide a gateway to the corporate network or could be used as carriers to distribute malware. While bringing your own…
UEWA – Ubiquiti Enterprise Wireless Admin
I’m excited to say that I have obtained the UEWA – Ubiquiti Enterprise Wireless Admin certification. A great starting point is to get yourself familiar with what you will be going through in class. I downloaded the UEWA Training Guide and made sure I completed it. Study the material well if your not a day…
Do you know the signs of a money mule scam?
Listen, I know it’s hard out there and there are so many ways to make money that seem legit and we all want an opportunity to make quick money but if you don’t know the signs of a money mule scam you will be taken for a ride. When cybercriminals earn money via illegal means,…
The 18 Identifiers Of PHI Crossword Puzzle
In this crossword puzzle we will identify a few protected health Information (PHI) words. These words are key to protect ourselves and everyone else that are protected under the Health Insurance Portability and Accountability act (HIPAA). Click on the link to learn The 18 Identifiers Of PHI, it will also help you with this Crossword…
QUICK HIPAA FACT SHEET
This quick HIPAA fact sheet will point you in the right direction! Did you know HIPAA, the Health Insurance Portability and Accountability Act was created in 1996? HIPAA is designed to maintain strict privacy over an individual’s health records. Other acronyms you need to know for HIPAA compliance: PII (Personally Identifiable Information), EPHI (Electronic Protected…
CYBER SECURITY IS UP TO ALL OF US!
Having a proper cyber security posture is up to all of us. All information created in the company is subject to the behavior of every collaborator. Use complex passwords and don’t share them with anyone. Note the sender’s and recipient’s domains when exchanging messages. When dealing with suppliers, have the confidentiality terms in mind. THE…
Kaseya Script To Remove Splashtop
This is a simple Kaseya Script to remove the Splashtop agent from workstations and servers. What does it do? I am glad you asked. The script uses the Kaseya scripting engine to execute the uninstallation string for the Splashtop agent. It is a very simple script but it does the job. [wpdm_package…
Back To School Safety And Security Checklist
It’s that time again, many of you are going back to school and a proper safety and security checklist will help you for the coming year. Schools hire new Administrative staff and teachers, teachers and students move to new classrooms, school buildings undergo construction. Before the new school year begins, teachers, administrators and parents should…
Physical Security Crossword Puzzle
As businesses become more dependent on technology so does the need for digital and physical security. Technology demands a significant amount of physical security to safeguard data, servers, networks and other devices. Security awareness is not just about preventing cyber attacks, it is also about protecting data in the physical world. Solve the Crossword puzzle…
How To Block Mobile Attacks
Mobile Attacks statistics show that more than 60% of fraud originates from mobile devices. Much of the world has gone mobile, and so have mobile attacks. Of the world’s cyberattacks, around 60% are initiated on mobile devices. About 80% of attacks against mobile devices take place via apps. Apps give hackers access to your device…