How to


173 articles

How to improve hiring practices in cybersecurity

How to improve hiring practices in cybersecurity

How to improve hiring practices in cybersecurity

Should schools and businesses do more to combat the shortfall of cybersecurity professionals by changing the hiring process for those interested in having a career in the industry?

Lysa Myers25 Sep 2018


Hook, line, and sinker: How to avoid looking ‘phish-y’

Hook, line, and sinker: How to avoid looking ‘phish-y’

Hook, line, and sinker: How to avoid looking ‘phish-y’

Top tips to help you avoid being caught receiving or sending phishing-looking emails

Lysa Myers25 Jul 2018


Router reboot: How to, why to, and what not to do

Router reboot: How to, why to, and what not to do

Router reboot: How to, why to, and what not to do

The FBI say yes but should you follow this advice? And if you do follow it, do you know how to do so safely?

Stephen Cobb04 Jun 2018


How to start analyzing the security of your IoT devices

How to start analyzing the security of your IoT devices

How to start analyzing the security of your IoT devices

The big challenge with IoT devices is that they are all different: Each manufacturer has its own firmware, uses different protocols, and designs its own architecture. So, the first step before carrying out any analysis is to understand the architecture, find out what components are involved, and how they interact and communicate among themselves.

Cecilia Pastorino02 Mar 2018


Think you have a tracker on your phone? Learn how to make your device more resilient

Think you have a tracker on your phone? Learn how to make your device more resilient

Think you have a tracker on your phone? Learn how to make your device more resilient

While it certainly doesn’t hurt to ask for help from local law enforcement, know that even major cities may not have the expertise or the bandwidth to investigate compromised mobile devices. The most important objective is to take steps to make sure you’re safe. Ask for help, but do not wait for others to help you.

Lysa Myers06 Feb 2018


Only…zero days left until the holiday shopping season!

Only…zero days left until the holiday shopping season!

Only…zero days left until the holiday shopping season!

The holidays are a time when people purchase gifts for their friends, families, and yes, even for themselves. Increasingly, children are using and accessing more and more digital devices — making it important for everyone to work together to secure these devices.

Guest Author21 Nov 2017


Tips for buying and sending gift cards

Tips for buying and sending gift cards

Tips for buying and sending gift cards

In a world where money is often represented as numbers moving from one place to another, the difference between types of payment cards may seem a bit nebulous.

Lysa Myers16 Nov 2017


How to secure your router to prevent IoT threats?

How to secure your router to prevent IoT threats?

How to secure your router to prevent IoT threats?

The router is the first device that you must consider, since it not only controls the perimeter of your network, but all your traffic and information pass through it.

Cecilia Pastorino26 Oct 2017


UEFI malware: How to exploit a false sense of security

UEFI malware: How to exploit a false sense of security

UEFI malware: How to exploit a false sense of security

When thinking about security we generally take risk into account. It is well known that risk is a composition of likelihood and potential impact.

Cassius Puodzius19 Oct 2017