Facebooktwittergoogle_plusredditlinkedinmailFacebooktwittergoogle_plusredditlinkedinmail

 

On this page you will find resources related to Cybersecurity and the wide range of topics that fall under this category.  In my current role, I work as a contractor to the U.S. Federal Government as the IT Operations & Cyber Security Manager and hold a Top Secret security clearance.  The agency I work for has an essential national security mission and a presence across the United States.  In my role I become involved in digital forensics, incident response, malware reverse-engineering, vulnerability management, security engineering, network security, purchasing, budgeting, metric development, and other technical and administrative cybersecurity functions.

 

Cyberattacks and How To Protect Your Computer and Data – Part 3 of 3

  If you have been following this blog series, you know that the first blog discussed the cyberattack kill chain and how hackers target individuals and systems and the second blog covered common cyberattacks and how they are perpetrated and identified. In this final post, I am going to discuss what users can do to harden their […]

Posted in Cybersecurity | Tagged , , , | Leave a comment

Cyberattacks and How To Protect Your Computer and Data – Part 2 of 3

  In my first blog, I discussed the cyber kill chain and how hackers move through predictable steps to launch an attack against a target. In that blog, I used the example of an author who was targeted because of their controversial writings and the author’s system was compromised with ransomware. In this second post, […]

Posted in Cybersecurity | Tagged , , , | 1 Comment

Cyberattacks and How To Protect Your Computer and Data – Part 1 of 3

  Cyberattacks and data breaches are unfortunately commonplace in the daily news cycle. Many of us have had our personal, healthcare, and financial data breached so much that we are used to receiving letters notifying us of unauthorized disclosures or getting signed up for yet another credit monitoring service. Cybercrime is out of control and […]

Posted in Cybersecurity | Tagged , , , | 2 Comments

The digital breadcrumbs in the Parkland, FL shooting: Were they followed?

  As more details emerge from the horrible mass shooting in Parkland, Florida on February 14, 2018, one item of interest is a YouTube comment left on a channel created by a man named Ben Bennight of Mississippi. Mr. Bennight noticed a disturbing comment left by someone with the YouTube account name of “Nikolas Cruz” […]

Posted in Cybersecurity | Tagged , , | 2 Comments

Windows 10 Parental Control Settings

  I received a significant amount of feedback from my recent post on how to setup parental controls with iOS 10 (available here), so I decided to follow on with another post on how to setup parental controls with Windows 10.  While Microsoft has had some good parental control features with Windows 7, when Windows […]

Posted in Cybersecurity, Information Technology | Tagged , , | 9 Comments

iOS 11 Parental Control Settings

  I have discussed here and here many of the dangers that kids face when trying to navigate technology and the Internet and some ideas for parents on how to mitigate these risks.  Parents have several choices available to them for parental controls on iOS devices and for this post, I tried several of the […]

Posted in Cybersecurity, Information Technology | Tagged , , , , | 18 Comments

Who Are You Allowing in Your House at Night?

  If I were to ask you to install an exterior door in your child’s bedroom and told you that this door could not have any locks, alarms, or other security, how would you react? Most people would be uncomfortable with an unlocked door anywhere in their house and especially in their child’s room. How […]

Posted in Cybersecurity | Tagged , , | Leave a comment

6 thoughts on “Cybersecurity

  1. Dear Josh,

    I am writing to ask you for a recommendation regarding my daughter’s online (and/or texting, phones, etc) activity on her iPhone, iPad and MacBook.

    I recently came across TeenSafe but my daughter dose not have a separate ID and Password for iTune and it seems like that is the way they monitor child’s activity. Giving them my ID and password (that I share with my daughter dose not seem like good idea or even helpful).

    I did a free trial of Qustodio but it did not seem to be accurate. For example my daughter does not even have a facebook account and Qustodio was reporting activity on facebook.

    So I am wondering what your recommendation is.

    thanks,
    Grateful
    P.S. I am sorry for writing here. My email to you returned suggesting “The e-mail message could not be delivered because the user’s mailfolder is full”

  2. Thank you very much for your response. We would definitely want to buy/use a drone. Is there a device similar to wireless sniffer that only detects the weakness of a network without having the capability of hacking/accessing inone’s data? The idea is to use the drone and that potential device on all the houses in our community and then alarm the owners if their network is “hackable”. As an alternative we may obtain consent of the neighbors to do so. But we prefer a device that is not able to access people’s data but can detect weakness in their network. I would appreciate your feedback.

    • Thanks – the implications of how drones can be used in cybersecurity is interesting. Depending on how much you want to spend, you could buy a drone and make it a wireless access point, showing how you could create a rogue access point, or place a wireless sniffer on the device like I wrote about in the article you mentioned and show how it could be used to sniff network traffic. If you did these, be sure to only do so on your personal network and be aware of your state’s cyber crime statutes.

Leave a Reply

Your email address will not be published. Required fields are marked *