Unencrypted | Pipeline held for ransom May 31, 2021By John Nicholas The recent hack of the Colonial Pipeline by a Russian cybercriminal group called DarkSide is...Columns·3 mins read·32 views
Unencrypted | What is Phishing? How can I protect myself from it? April 19, 2021By John Nicholas There are any number of unusual terms when it comes to cybersecurity and Phishing is...Columns·3 mins read·49 views
Unencrypted | What is SolarWinds? Are updates still safe? March 29, 2021by John Nicholas In December 2020, the cyber world was shaken with the announcement of the hack of...ColumnsUncategorized·3 mins read·70 views
Unencrypted | Artificial intelligence, machine learning and internet bots February 8, 2021Writing by John Nicholas Automation has been around for decades. Factories, telephone systems and even fast food all...Columns·3 mins read·28 views
Unencrypted | What is two-factor authentication? December 16, 2020Writing by John Nicholas One of the best options available to protect your personally identifiable information is to...Columns·3 mins read·18 views
Unencrypted | What are “deepfakes” and how can you spot them? September 16, 2020Writing by John Nicholas Deepfakes, or deep fakes, are manipulated videos, images or audio produced by sophisticated artificial...Columns·3 mins read·322 views