Ashley Thacker
-
Security policies are the bane of everyone’s existence. Those documents define the rules of your workplace, but you may not always agree with them. When creating these documents, it is important to balance them so that users can do their jobs, but the information systems are also protected in an organization. Now, you may ask Read more
-
Starting in late 2024, the rise of fake CAPTCHA tests began to take the internet by storm. These CAPTCHAs are used as a way to trick users into executing malicious PowerShell scripts by following the instructions provided. The PowerShell command will download and execute malicious software such as Lumma Stealer infostealer and SecTop RAT (Remote Read more
-
As a cybersecurity professional, I hear these terms interchanged all the time. Although we like to believe that these terms are the same, one actually umbrellas the other. What is cybersecurity? Cybersecurity focuses primarily on the protection of digital spaces against cyber attacks. These attacks can range from your day to day phishing emails all Read more
-
In today’s technology world, there are many cybersecurity concerns that arise daily. Fear not though, as there are ways you can keep yourself safe and protected while you go about your daily browsing! Be Wary of Your Emails Whether it is your personal email or work email, 36% of all data breaches occur due to Read more
