Cybersecurity and Domain Name Privacy
WCC14 Domain name privacy for small businesses By Carolyn Schrader Domain names are a must-have in today’s business world. Many businesses own multiple names, even if they only use one actual website. Some businesses neglect to ensure privacy of the registration information, unfortunately. A personal address, email address or phone number are visible to anyone looking, unless the WHOIS data is marked private. What is WHOIS? WHOIS is a protocol used on the Internet. It is
Cybersecurity and Cyber-Vigilantism
Cyber-Vigilantism By Charles Parker There have been a number of scams perpetrated over the years. These have preyed on the elderly, less than tech savvy, grandparents, and others. They could steal intellectual property, money, staff member data and information, or simply be an annoyance. This could cost thousands of dollars and hours upon hours of work to correct. The effects could last years. With all of the cost, stress, and anxiety this generally causes, people affected
Cybersecurity and PDFs
PDFs: Still be wary By Charles Parker Phishing is no different than other attack methodologies. These evolve over time. Initially the attack may be a bit unsophisticated and rough. These attacks tend to work for a bit, until a defense is put in place. At this point, the attack improves its operations or mode of attack, much like a business would improve its operations if the need presented itself. Phishing has exhibited this trait as well. Phishing began, and to an extent,
Cybersecurity and Non-Profits
Even Non-Profits are Targeted By Charles Parker To an attacker, data is data. It is a commodity to look for, breach a target for, steal, and sell. The focus and process itself is not that complicated. The target data is the same for a profit and non-profit. The difference to the attacker though is the non-profit may not have the ability to put a full defense-in-depth in place to secure its enterprise. A specific, troubling issue affecting the non-profits has been social eng

