One of the top requests I get is on how to write a great resume.  How long should your resume be?  What should You include?  What should you leave out? What is the purpose of a Resume?  Resume Tips and Tricks.

You can check out our past sessions and signu...

December 15, 2016

The Oct. 21st 2016 DDoS attack on the domain name servers of DYN has been the recent topic of many articles lately. The attack left many websites offline for several hours. What I would like to focus on here is what we can do to prevent such attacks.
First off this att...

December 14, 2016

Here are 5 of the most dangerous hackers to ever walk the streets of the Internet.

December 14, 2016

Resume Tips 2016 (Updated) - Your resume sucks now let me show you how to fix it

December 14, 2016

Greetings -

This time of year is sweet for hackers; IT folk are off, you’re on break and perfect targets for malware infestation and ID theft.

Even better, many email systems don’t filter bad emails very well. They can pass through or retain many bad emails in quaran...

December 13, 2016

Ernest Cline’s “Ready Player One” is a book filled with references to video games, virtual reality, ’80s pop-culture trivia, geek heroes like E. Gary Gygax, and funny-sounding cult items like Frobozz and Raaka-Tu. They are interested in that time period because of a bi...

December 12, 2016

NIST is Proud to Announce the Release of Special Publication 800-179, Guide to Securing Apple OS X 10.10 Systems for IT Professionals: A NIST Security Configuration Checklist. This Special Publication has been approved as final.

Link to the Announcement of this SP’s r...

December 11, 2016

The more and more items we add to the IoT (Internet of Things) the more and more security hacks you should expect to find.  You have companies that are not necessarily IT technology companies adding IT to their items.  Coupled with insecure coding practices, we should...

December 10, 2016

A new level of danger.  In Vehicle Informant (IVI Computers) are being hacked with deadly results.

“Two hackers have developed a tool that can hijack a Jeep over the internet. WIRED senior writer Andy Greenberg takes the SUV for a spin on the highway while the hackers a...

December 6, 2016

I found this story interesting because it was about an internal IT employee. For supporting the company employees, he was given the passwords and network credentials for them. This would allow him to  remotely access their computers to address technology issues. With t...

Please reload

Featured Posts

Does Security Awareness Work?

July 18, 2018

1/10
Please reload

Archive
Please reload

Follow Me
  • Facebook Basic Square
  • LinkedIn Social Icon
  • Twitter Basic Square
  • YouTube Social  Icon
  • SlideShare

© 2018 by Donald E. Hester. Proudly created with Wix.com     |    Sponsored by

  • Facebook Social Icon
  • LinkedIn Social Icon
  • Twitter Social Icon
  • YouTube Social  Icon
  • SlideShare