Introduction to Cybersecurity

This afternoon I presented “Introduction to Cybersecurity” to members of the New England Water Works Association in New Haven, CT.  The presentation focuses a recurring theme of this blog; no/low cost options for improving security.  This particular...

Domain, Web, and Email Hosting Explained

A lot of confusion (understandably) exists about how domain, web, and email hosting works and what the difference is between them.  Most online services these days offer all of these services, so is it really necessary to understand the differences?  Just like there...

Top 5 No-Cost Cyber Security Practices

I’ve come to a remarkable, if not depressing realization in my information technology career.  Over the last 20 years of consulting, I’ve visited scores of clients in hundreds of facilities and I can easily count the number of times I was ever given any...

How to Spot Phishing

Phishing is a deceptive tactic used in emails, on bogus web sites, and other communication media that convince people to click on a link that typically brings the user to an impostor web site. These cyber attacks are generally attempting to accomplish one or both of...

The 21st Century Land Grab

By now, many people are familiar with Cybersquatting – a process whereby a person registers a domain name in bad faith with the intent of reselling it later for a profit. Recent legislation has made it easier for trademark holders and famous persons to obtain their...