End User Awareness 6 – Protecting Against Websites

Protecting Against Websites Internet connectivity means anyone in the world can launch an attack against us. When we browse the web, we initialize thousands of connections to many different servers…

Read more »

End User Awareness 5 – Protecting Against Bad Emails

Protecting against Emails Emails and Attachments Email is one of the easiest ways for attackers to reach victims. It provides anonymity for the attacker which can send attachments which carries…

Read more »

End User Awareness 4 – Protecting against Social Engineering

Protecting Against Social Engineering Social Engineering may present the greatest threat to confidentiality today, which is why it’s important to understand not all threats are technical attacks. Simply by manipulating…

Read more »

End User Awareness 3 – Protecting Identities

Protecting your Identity Identity theft online is more common than you would believe. Take for instance a celebrity’s Instagram account, which most likely has been copied over a dozen of…

Read more »

End User Awareness 2 – Protecting The Network

Network Protection Network attacks are the most common technical threat to a network. Even if we keep our data safe on our computer, it may still be possible for an…

Read more »

End User Awareness 1 – Protecting The Physical

Physical Cyber Security As we go on with our lives, we keep thinking of secure passwords, usernames, and logins- but we forget the physical part of it all. In this…

Read more »

What Is Machine Learning

Machine learning- Data mining, optimization, statistics, algorithms, limitations, and software… Wait, a machine that learns? That’s correct. Machine learning is the science behind making computers act like humans and learn…

Read more »

Information Technology- Why choose it?

The Fourth Industrial Revolution (4IR) is the new wave of technology. From the very beginning back in the 18th centuries in Europe America, all the way to 2019 where the…

Read more »

Networking Part 10- Routers, Managed vs Unmanaged Switches, Access Points, WAP Placements, SSID

Routers The device that “connects us to the internet” / forwards data packets A router is a device that forwards data packets, helps to hand out IP addresses and performs…

Read more »

Networking Part 9 – Frequencies, Interference, Signal Strength, Bounce, Channel Bonding

Frequency Bands & channels A frequency band is a range of frequency that is divided into multiple channels Frequency bands are most commonly found as 2.4 GHz and 5GHz. When…

Read more »