Protect Your Data
Protect Your Family
Protect Your Business
In general terms, an attack is defined as an act of violence. Attacks can happen in many ways and could be physical and/or emotional in nature. I was kidnapped when I was in my early 20’s. After that experience, I wanted to regain my confidence and feel strong, so I decided to take martial arts lessons. I was so nervous the first day! I was not coordinated at all. The movements were very challenging, the workout was so intense that I barely made it through, and I had to empty my stomach at the end of the class. Yikes! Yet, with persistence and practice I became stronger and more centered. Although I didn’t master this discipline and I was only able […]Read More
Identity theft can happen to anyone, regardless of who you are, where you are from, or what you do for a living. It can happen to you just as it happened to me. When a Cybermonster stole my identity to smuggle women into the US, I felt like my life was managed by someone else. When I googled my name, I saw that everything was in Chinese characters. My heart just stopped. I wanted to cry, scream and hide, all at the same time. All I wanted was to feel safe again, for things to go back to normal, and to wake up from this nightmare. I spent all my time hoping this wasn’t happening. The reality is it did happen […]Read More
Are you ready for another Happily Ever Cyber fairytale? Let’s learn about a little girl named Goldilocks, and her encounter with the three bears. Once upon a time, there lived 3 bears. Mama Bear, Papa Bear, and Baby Bear lived in a cute wooden cottage in a deep forest. They loved each other very much, and did almost everything together. They had matching chairs and bowls, matching computers and phones, and even matching WiFi networks and chargers. They loved listening to music together and going for long walks in the morning while their porridge cooled down. One such morning, Mama Bear had just finished making a big pot of porridge. She served the porridge in their bowls and opened the window […]Read More
Recently a tech savvy friend of mine posted her vaccine card on social media showing her name and date of birth. Immediately, I was concerned. She wanted to celebrate a proud moment, share her beliefs with the world, and demonstrate how important this action was to her, and that’s why that moment of excitement overrode the knowledge of the threats she knows exist in the cyber world. A side effect is an adverse, harmful or unwanted effect that happens as a result of getting a desired or needed. When we share vaccination cards (or any other medical records), we are increasing our risks of being victims of a cyber attack. Social media platforms (such as Facebook and LinkedIn) are vulnerable when […]Read More
I’ve been in the Technology, Data Privacy and Cybersecurity fields for over 20 years, so I decided to break down cybersecurity for you and share everything you need to know about cybersecurity, so you can get a full picture of why cybersecurity is so important and how cybersecurity applies to the protection of your data, your family and business. I’ll also be sharing the four most common types of cybercrime, introducing you to the Cybermonsters, and give you a list of seven tips you can implement today in your cyber safety practices, whether you’re new to cybersecurity or not. Let’s start with an important question: What is cybersecurity? Cybersecurity is the set of practices, processes and technologies designed to protect our […]Read More
In 2005, when my family relocated to the United States, my employer was in charge of arranging our temporary housing. Phillis was helping us find our new home. We communicated back and forth via email, and when she asked me about the most important features I needed in a house, I replied without hesitation: “I need the house to be secure and the doors to have a strong protection mechanism.“ We arrived at our home and to my surprise, the condo had a simple door knob. In Phillis’s mind that was the protection mechanism or lock that I needed. However, when I saw the door, my heart started to race – I couldn’t imagine myself living in a house without at least […]Read More
Do you know what malvertising is? The first time I heard about malvertising I was in shock! Early in my career in cybersecurity, I had to learn about so many new concepts. It was a process to shift my thinking to understand how Cybermonsters work. Learning about how Cybermonsters use legitimate ways to infect our computers was something I had never thought of. I knew that I could get malware or a virus if I clicked or opened an infected file on my computer or other devices, but learning that I could get infected by visiting my favorite websites was surreal. The fact that by simply hovering my mouse on an infected image could hinder my devices was crazy. What is […]Read More
Are you Cyber Safe?
Try our Cyber Assessment Tool to find out!