Accessibility Tools

Skip to main content


Social Engineering - USB Drives

  First of all, what the heck is social engineering? Kind of a strange term if you ask me, but it's pretty simple. It's people hacking. The largest vulnerability in any organization is the (most of the time) good, (usually) honest, hardworking (when the boss is around) employees at that organization. I point out these stereotypes because humans are unpredictable, inconsistent, emotional beings that can be easily manipulated. The same cannot be said about computers and often times technology, firewalls, etc. simply stump even the best hackers. But what if they can trick someone into...

Read more …Social Engineering - USB Drives

Beware Free Wifi!

  There are a number of ways attackers can steal personal information from you and your devices while using free WiFi. This includes (but is not limited to) hotels, restaurants & libraries. You can spot an insecure network by the absence of a lock icon next to the network name. Always use secure networks that you have been authorized to use and given the password to. When using a mobile device, use your cellular data when possible rather than insecure WiFi networks. When using a non-cellular device, tethering is a favorable option (sharing the network connection from your phone...

Read more …Beware Free Wifi!


  Ever gotten an email that was a little out of the ordinary? Maybe it had bad grammar? Or maybe it asked that you click a link or download a file that you weren't expecting? All of the above? You're not alone. Next time you get an email like this, there are a couple of quick verifications you should do, because cyber criminals are getting better and better at evading filters and making sure their phishing scam lands in your inbox. The next time you get an email like this, hover your mouse over any links or buttons you see for a few seconds, but don't click! You'll see a pop-up window...

Read more …Phishing

Security Training Resources

  If you're here, you've probably recently received one of my security trainings. In this training, we discussed a number of different tools, resources, etc. to help aid you in your pursuit to increase the security of your digital life. Below is a link to a Google doc containing MORE links (yay links!) to all those resources, videos, tools, and articles discussed. If there's anything you think I've missed, please reach out to me This email address is being protected from spambots. You need JavaScript enabled to view it. and I'll be sure and add them.

Read more …Security Training Resources