Security
Online Security in the Office: A Shared Responsibility
Is your workplace safe from cyber-attacks? Education and prevention are the best methods of protection. Read on to learn how to stay safe online at work.
Cyber Security Explained: Everything You Need to Know
Learn the what, why, and how of protecting your computers and online activities. This article is perfect for beginners who just recently became aware of what cyber security is. Whether you're an individual or a small or large business owner, learn why cyber security matters.
Let's Keep This Private
Most users keep their personal data on a public cloud. In this article, we can review the risks of keeping important data on a public cloud, and why a private cloud is much safer.
Don't Overlook Security Now That You're Remote
Hackers are capitalizing on the lack of security of networks that have moved their entire workforce to a remote connection.
What Is the CIA Triad (and How to Use It Today)
The CIA triad is used by organizations to secure classified data. Apply the CIA framework in your day-to-day life to help keep your information secure from hackers.
Cloudflare Firewall Rules for Securing WordPress
Cloudflare provides up to 5 firewall rules for free that can be used to harden WordPress sites, protect the admin area, and block automated wp-login.php scans before they even reach the host server.
6 Ways to Keep Your Family Safe From Identity Fraud
Thanks to the Digital Age, we're more connected than ever before. Yet, that could also mean we're more vulnerable to exposure. Here are six ways to keep your identity, as well as those of your family members, as protected as possible against identity theft.
The Threat of Fraud on Social Networks
Recent publications note a rise in cybercrime using banking Trojans linked to social networking sites. These instances demonstrate that visiting the Internet is not always an endeavor void of risk.
How to Avoid Internet Phishing Scams and Computer Viruses
Learn to recognize fake security-threat warnings meant to make you fall for scams and install viruses in your computer.
Warning: Do Not Open E-Mails With These Characteristics
There are some obvious warning signs for fake e-mails that you should not open. Pay close attention to the signs to keep from being hacked.
How to Secure Online Accounts
Learn what you should do to secure your online accounts. This is important information everybody should know to stay safe online.
Did Your Company Have a Security Breach? Here's What to Do
Cyber-attacks are occurring more and more frequently; companies have to know how to deal with a security breach and do effective damage control.
Are Third Parties a Cyber Risk to Your Business? Be in Control!
Third-party vendors oftentimes pose the greatest risk to a company's cyber security. Be sure you take appropriate safety measures when contracting a thrid-party vendor.
How to Protect Your Company Against Cyber Attacks
Is your company prepared to face cyber attacks? Check out what security measures you should consider to be safe in cyberspace.
The Cyber Threat in the Modern World
The Internet is an invention that has certainly made our lives better. However, it is also used by various criminals and terrorists. Learn about the dark side of the Internet.
Intercepting HTTPS Traffic Using the Squid Proxy Service in pfSense
By default, the Squid Proxy has no visibility of encrypted HTTPS traffic. Enabling HTTPS interception will allow you to monitor and log encrypted web traffic passing through the Squid proxy server.
How to Easily Remove the Svchost.exe Virus
This article covers how to easily remove the SVChost.exe virus, which is known to be connected with various rootkits. All needed downloads to remove the virus are provided.
How to Access pfSense Remotely Using SSH
SSH is a very versatile and secure method for remotely connecting to a pfSense router. SSH can provide remote console access, securely transfer files, and even remotely run applications. This article will walk you through all of the configuration settings for SSH with detailed screenshots.
How to Set Up a Radius Server on pfSense Using the FreeRadius2 Package
In this article, I'm going to explain how to set up a radius server with the FreeRadius2 package on pfSense. FreeRadius is a popular open-source Radius server. Radius servers provide a central authentication source for routers, switches, VPN servers, and other network devices.
How to Configure pfBlocker: An IP List and Country Block Package for pfSense
The pfBlocker package adds the ability to add IP block lists to a pfSense router or firewall. The package combines the functionality of the popular IP Block List and Country Block packages. There are several free block lists that target hackers, viruses, spammers, and botnets.
How to Set Up Intrusion Detection Using Snort on pfSense 2.0
The Snort package allows you to turn a pfSense firewall into a powerful network intrusion detection system. Learn how to set it up here.
How to Monitor Your Website for Cyber-Attacks and Stop Them
Many websites are breached by cyber-attacks to steal customer data. I implemented a routine to stop them in real-time.
How to Set Up an HTTP Antivirus Proxy Using pfSense and HAVP
By installing the HAVP package on pfSense, you can automatically scan all of your web traffic for viruses and malware. This will prevent viruses from even entering your network. HAVP is great for wireless hotspots and other public networks where you do not have control of the client computers.
Is Your Computer Secretly Sending Malware to Your Friends?
Cyber-hackers use your computer to send malware to your friends. Thinking it's from a trusted friend, they open the email.
How Buyers Scam Sellers on eBay (A Decade of Scams)
eBay quickly became and has remained one of the largest selling platforms online, but is it safe? This article discusses some of the ways eBay sellers get scammed.
How to Set Up a Transparent Squid Proxy Server Using pfSense
Proxy servers can be very useful for improving the speed of an internet connection by caching, logging internet usage, or filtering the traffic. Learn how to set up a transparent proxy using pfSense.