FileHash v5.0 has just been released, and it comes with a focus on making it easier to automate the following two things: Obtain the checksums of a set of files in a directory (and subdirectory), and then use that checksum list to compare the same directory structure...
There is every indication that businesses and networks in Western countries are very likely to face increased cybersecurity attacks in the near- to mid-term. Here are some things to consider and for the protection of personal and commercial networks (to include those...
The number of cybersecurity attacks against social media accounts is rapidly increasing, and attackers are often successful in preventing recovery of the accounts, resulting in victims having to totally abandon their former accounts. Here are some steps that should be...
On June 30, 2021, I had the privilege of presenting the second of two introductory cybersecurity webinars to small businesses, on behalf of the Bluefield West Virginia Economic Development Authority, and in conjunction with the West Virginia Small Business Development...
On June 16, 2021, I had the privilege of presenting the first of two introductory cybersecurity webinars to small businesses, on behalf of the Bluefield West Virginia Economic Development Authority, and in conjunction with the West Virginia Small Business Development...
Yes, you need to understand technology and cybersecurity architecture. No, it doesn’t matter what your business is about – you need to understand this if you want your business to succeed. No, it’s not “fair”. No, there’s not enough time in a day. ...
It is quite an understatement to say that many people will be very happy to leave 2020 behind. But, as we prepare to enter 2021, we should take stock of the various lessons that we have learned this year, and endeavor to apply them in 2021 and beyond.Today, I’m...