Protect Your Data
Protect Your Family
Protect Your Business
Growing up I used to watch Coyote and Roadrunner, and I always ended up irritated. I used to wonder “Why doesn’t Coyote use his creativity and out-of-the-box ideas for something better than trying to trick Roadrunner? What a waste of talent!” Did you ever watch these cartoons? Did you ever have this thought? Cybermonsters act like Coyote every single day. They will use elaborate email traps, including attachments and links with the intention to lure us. They pretend to be legitimate financial institutes, government agencies, businesses, even our friends or relatives. We become the “roadrunners” in the story, so we must always stay aware and mindful of our surroundings when it comes to our technology. How do I know If An […]Read More
How important is your password to you? When you think about how your passwords could be actually keeping your family, your business, and your identity safe, it really shifts your perspective about what your password actually means to you. 3 things you can do NOW to keep your passwords safe: Because your password is essential to your financial well-being and your peace of mind, I want to share 3 meaningful ways to keep your password safe. 1. Think about the MEANING of your passwords How much power are you giving a string of characters to PROTECT your accounts? Your passwords are protecting your social media accounts, but also your bank accounts, your confidential data, like medical or finance records. Your passwords could […]Read More
As a child, I remember hearing the story of the 3 little pigs and the big, bad wolf. It’s very likely you’ve heard it too! 3 pigs build different houses – one of straw, one of sticks, one of bricks, and one by one the wolf tries to huff and puff and blow the house down. I’d like to share with you a cyber retelling of this beloved fairytale, about having a strong password. Once upon a time there were 3 little pigs. They each had a brand new computer that they used to connect with family, search the web, and complete work. The computers were very similar in model, size, and shape, but they had one major difference: their passwords! The […]Read More
Many people ask me, what steps I took to start my business, Way2Protect. I’m going to reveal the seven steps that worked for me to transition from over 20 years of corporate work to brand new entrepreneur. You may not even be able to imagine taking action toward your dream of becoming cyber savvy, because there is so much fear around it, or maybe you don’t know how to get started – and that’s how I felt when I jumped in both feet into entrepreneurship. As you read about the seven steps I took to face my fears and pursue my dream, think about your cyber journey and realize that everything falls into place and that you are not alone! 7 Empowering Steps To Start […]Read More
Many people ask me why I’m so passionate about Cybersecurity. After many years in the IT field, I switched to Cybersecurity because I was on a journey of reinvention – almost like a rebirth. After several years, I started to notice that I was very passionate about my work related to helping women become aware of and how to protect their cyber world, I wasn’t passionate about many other aspects of my job. 7 Cues That Led Me To Start Way2Protect: 1. I woke up most days having a strong feeling there was something missing in my life; 2. What used to be exciting and thrilling about having a career and climbing the corporate ladder was not there anymore; 3. My mind was stuck on negative […]Read More
When you think about the word “Cyber,” what comes to your mind? Do you think about your social media, your email, your computer, your phone? Do you think about the pictures you have posted online? Do you think of all your documents, personal information, and data you have stored somewhere? The word Cyber comes from the word cybernetics and relates to computers, information technology or networks. For me, the word Cyber means emotion, connection, creativity, wellness, growth, fun, happiness, and wealth. Technology can bring us closer together and I love that! In the Cyber world, many of us choose to always be connected, and always cyber available to others, while others choose not to. To Cyber-Be or Not To Cyber-Be, That Is The Question! To Cyber-Be or Not To Cyber-Be is about considering your state of Cyber. […]Read More
Have you ever received an email from a friend, asking for a favor that involves money? You feel so conflicted because you want to help, but the message feels sketchy, or just wrong, especially because they rarely communicate by email. Chances are, you were looking at an email sent by a hacker, scammer, or a Cybermonster, hoping you will click on the link they sent, or open the attachment attached. Cybermonsters also send messages saying you won the lottery (even though you haven’t even bought a ticket), or that you won an amazing prize, which you can collect instantly if you’d just “click here.” Email has become such an important method of communication, so of course we need to use it, […]Read More
Are you Cyber Safe?
Try our Cyber Assessment Tool to find out!