ABCs
Glossary
A growing glossary of technical, cybersecurity, and computer terms explained in plain language. Click on hyperlinked terms in articles to access definitions and return seamlessly to your reading.
IT professional with 20+ years experience, now focused on cybersecurity, with a passion for writing, helping small businesses secure their networks & empowering schools with cybersecurity knowledge.
ABCs
A growing glossary of technical, cybersecurity, and computer terms explained in plain language. Click on hyperlinked terms in articles to access definitions and return seamlessly to your reading.
ABCs
Someone jokingly said that social engineering is how cybercriminals socialize. But on a serious note, it is one of the most powerful methods used by cybercriminals in their efforts to steal your identity. Cybercriminals do not only rely on computer systems, hacking tools and systems; they also rely on their
ABCs
Have you ever gotten an email that seemed genuine but for some reason it did not look right? Maybe it was from Amazon asking you to update your account password, or what looks like a FedEx email for a package you did not order. These are examples of phishing emails.
seeCurrent
Ransomware attacks have become a very common cyber threat, affecting nearly everyone directly or indirectly, and just to show how bad it is, speak to a random person about ransomware and chances are they were either affected or they know of someone who was or they know of somewhere that
seeCurrent
The eSIM technology has provided both convenience and flexibility to mobile phone users especially those who travel and would like to have mobile phone service where they are. There is however one little problem with the use of eSIMs and if not address leaves a vulnerability taken advantaged by cybercriminals.
howTo:
Welcome to our first howTo: guide on deploying DMARC on a $0 budget. We will walk you through the steps to improve your email deliverability. So if you are just starting to use DMARC or want to explore a possible $0 approach to your present DMARC implementation, look no further.
howTo:
So we have learned what a SPF record is and how important it is for our email deliverability. Let us now look deeper into how it can impemented on your own for free. This guide has been tested and confirmed to work as described. However, please ensure you fully understand
howTo:
So we have learned what a DKIM record is and that it is an email authentication method that uses a digital signature to let the receiving email server know that the message was sent and authorized by your domain. Let us now look deeper into how it can impemented on
toKnow
Even with so many advanced technical forms of communication, email remains the most popular means for organizations, marketing departments, communicating with clients, collaboration among co-workers and even communicating with a friend. So, it is important that emails reach their intended targets. Even with the addition with high-tech antispam solutions, with
Habits
Cybersecurity isn't just about technology; it’s about ensuring that technology and human behavior work together to protect an organization's assets, so that it will achieve its goals securely. Anything that prevents an organization from achieving its goals securely, is considered a risk to that organization.
Habits
Cybersecurity is more than just the technical, it is also about creating a culture of security awareness and responsibility. It’s important to create secure habits within small businesses and schools in order to mitigate cybersecurity risks. Here are some steps that can be followed in order to build habits