Online Privacy: Is it real?

Posted by Josh on November 20, 2012 in Security |

  Online Privacy, to a large degree is a myth that we tell ourselves exists to ease our minds about the various things we do and place in to the ether of the beast called the Internet. The largest problem with the Internet and the concept of privacy is how the Internet works. As an […]

Tags: , , , ,


The WiFi threat is real

Posted by Josh on August 5, 2012 in Security |

One of the most common threats to a computer user’s security is something that has been widely adopted by businesses and home users alike.  Wireless internet connections, also known as Wi-Fi, has made connecting you computing devices to the internet easier in a wide range of locations.  The same technology that allows you to connect […]

Tags: , , ,


Social Engineering….Your IT’s biggest threat?

Posted by Josh on July 23, 2012 in Security |

  Social engineering has slipped to the way side a bit when people think of IT security.   A focus on patch management, packet inspecting, IDS/IPS, and the like taking the main stage, leaving social engineering as a back burner project. Social engineering has evolved from the old movie staples of “dumpster diving” to flashy websites […]

Tags: , , , ,

Copyright © 2012-2023 All rights reserved.