Random carousel of articles
Coronavirus special report: Separating your Work and Personal identities
Domain search – how to avoid front runners
Zero day, 0day, ohday, oh my!
Hackers have a few things in their favor when it comes to getting into your…
Where to find “free use licensed” photos and videos
WordPress: WordPress Subdirectory management
Credential theft
Using Artificial Intelligence to create predictive systems
The term Artificial Intelligence (or AI) was coined in the mid 1950s. AI technology was…
Centrally managing WordPress sites
Managing multiple WordPress sites is no easy task. While managing a single WordPress site in…
WordPress Plugins (1.0 Introduction)
WordPress is an incredible Content Management System — and it is free! WordPress off the…
“Break glass” emergency privileged access
Exploring advantages and disadvantages of Cloud: IAAS PAAS SAAS
Link tracking – who clicked my link?
Link checkers
LinkedIn – Writing the “right page” right!
Identity theft
Phish for phun and profit
Phishing is a real problem, and that problem is only increasing in frequency. Phish attacks…
WordPress Post Revisions
Restricting outbound firewall rules in operational environments
Computer Security Incident Response (NIST SP800-61r2)
Vishing-don’t be a victim
Business Continuity Planning
Business Continuity Planning (BCP) is the pre-planning effort put in to make sure your business…
The end of the (land) line
So you’ve looked at your local phone bill and it was… oh my, I’m paying…
Help I’ve fallen and my identity has been stolen!
Privacy at the workplace
WordPress Plugins – 2.1 Interact with your users – Mailjet Outbound mail relay
Free domain names
Prevent content filtering from affecting your web site
Payment card theft
Risk management – developing a framework
Risk management is an essential skill for any business professional. Whether it be having a…
The first rule of security: “Be aware”
WordPress host hardening: password protect wp-login
Business & Technology Planning
Inmotion Hosting review
WordPress Plugins (2.0 Security: Confidentiality, Integrity, Availability)
This post is a part of the WordPress Plugins discussion threads and focuses on Plugins…
WordPress 2019 Featured Image shading
WordPress Plugins – 2.1 Mail Relay
Let me ask an honest question. Would you rather be doing business with “bobrx153@hotmail.com” or…
Exploiting the SDLC
Future of malware – December 2022
“The future of malware” is a trigger for most of us in computer security. Most…
Video creators and editors (and Image!)
Computer security hardening – safeguarding your computer
Putting your computer in chains is one way of hardening the system Computer Security. Kind…