Skip to main content

12 Weeks of Reflection

12 Weeks of Reflection



Over the last 12 weeks, I have been talking and discussing a lot of various topics. From physical security, to just better security habits. I think when it comes to cyber security and securing your assets, there is no one size fits all answer. There are so many different situations and needs that not one solution can protect. That is what makes IT Security such a vast and exciting field! Each case and situation is going to be different from the last. If there was just one solution, I think we would all be in danger because all it would take is one fault in the system and then it is game over!

That is why over the last 12 weeks, I decided to talk about different topics that could help someone starting with cyber security, to get a good overall picture of what cyber security involves. I tried to include resources and information that I have learned over the course of the last three years while pursuing my degree, to help those out there who are more interested in cyber security. This Internet driven society will only tend to get more dependent on the network we are all a part of, the best thing we can do is protect ourselves before we are too woven into the cyber fabric.

I think by doing this blog, it helped me better understand the vast amount of information cyber security encompasses. There are so many angles, fixes, patches, solutions, and other tidbits of information that create the entire cyber security picture. I think by doing this blog, it helped me reflect on what is needed today and what can wait until tomorrow. I think a lot of IT professionals should start a blog, it allows them to research, reflect, and remain current on all things cyber security.

Well to all my fans out there (if there are any) it has been a fun ride the last three years while getting my graduate degree. I hope that all of you will also aspire to keep educating yourselves and remain current in this cyber world, if you fall behind you will feel it!

Comments

  1. yet it now contains your file.In order to view/extract your file, there are two options that you can take) Change the file extension from xyz.jpg to xyz.rar https://www.serioussecurity.com.au/melbourne/

    ReplyDelete

Post a Comment

Popular posts from this blog

Project Manager says "What?"

Project Manager says "What?" In my almost four years of professional IT experience, I would say my experience with project managers has been a mixed bag. In some projects I have had great PMs. In other projects, you wonder if the PM even knows what you are doing there in the project meeting! Sometimes I feel like I had project managers that didn't even know what the project deliverable was. We spent more time explaining our solution than going over action items. Here are some things I think all project managers should do to be effective in managing projects. Learn more about the project deliverable I felt like more times than not, project managers on some of my projects didn't even know what we were working on. They didn't understand the technology or the expected outcome. I think if we spent more time up front educating everyone involved, including PMs, the project would be much smoother.  Have clear and effective communication I have ...

Who needs protection anyway?

Who needs protection anyway? You wake up to a new day, grab some breakfast, and turn on the news. You hear another story about a huge company involved in a massive data breach! You think to yourself "Man that sucks! That is never going to happen to my small business." You show up later to your office and one if the IT techs is framing out, little do you know that your small business has been involved in a data breach! Customer information has been leaked out. Uh oh...this wasn't supposed to happen. Just because your a small business it doesn't mean you shouldn't worry about data breaches. No matter how big or small your operation is, having firewalls and network security in place is vital. All it takes is for someone to  visit the office and network sniff to gather information. If that information is encrypted and using secure protocols, then that network sniffer won't find a thing. Firewalls used to be somewhat of a pain to setup, but now with more u...

Careful Who You Trust

Careful Who You Trust When it comes to securing things in your life, whether physical workstations, electronic files, or even intellectual property, there are going to be a number of threats and possible attacks against your property! More often than not, many people when they hear about cybercrime and cyber attacks, envision that "Hollywood Hacker", you know the one you see in movies where they can type really fast and all that green text is just scrolling up their computer screens, and within seconds that have gained access to the Government's DB that contains all the secret alien files that prove that E.T. was more than just a entertaining movie. Well, that isn't always the case in todays modern world! Hackers come in all shapes and sizes. Some or even software programs that can be easily triggered by someone who doesn't really know what they are doing, but some of the hackers we need to worry about the most, or those who know the most, the internal employ...