Just Because You Can…: Consent in Cybersecurity
“Just because you can do something, doesn’t mean you should.” You’ve probably heard that in many different contexts. Today, I’ll tie it to cybersecurity and how it deals with consent.
Want to Get Rich? Start Here! Buyer Beware
So, you probably saw a photo of a banana sold online for tens of thousands of dollars and thought, “I can do that! It’s easy money, and it sure beats working.” Afterward, you did some digging and discovered the growing world of NFTs.
3 Best Practices for Keeping Your Data Safe While Online
Current world events are tough right now. And unfortunately, cyber attacks from Europe are on the rise, according to our Federal partners. Here at Round Rock ISD, I want to reassure you that the school District is taking every means necessary to keep you and your data safe. We are monitoring the world situation, along with other districts and agencies. But, we can’t do it alone. We need your help!
What kind of potato are you?
Social media and I have a rose/thorn relationship. It’s a great way to keep in touch with friends and family, but at the same time, social media is a gift-wrapped box of chocolates for hackers. So, while many of us share the bad habit of scrolling with the small phone screen while half-paying attention to the latest episode of 90 Day Fiance or Married At First Sight, would-be attackers are not-so-hard at work.
Leveling Up
Welcome! I’m happy you’re here. My goal is to share some thoughts and ideas in the world of cybersecurity. Each time you choose to visit this blog, I hope you leave it more knowledgeable about the world of cybersecurity.
The Cybersecurity Team
An organization’s cybersecurity is more of a team sport. Here are two major teams in this field, and we separate them by color: Red and Blue. The Red Team’s philosophy is to protect by attacking first and attacking often and the Blue Team where they need to improve.