Blog Posts
Here the CyberTech team works to create posts to keep you informed about good cybersecurity practices and what users of all age groups should be doing online.
Ethical Hacking Fundamentals: Exploring Information Gathering Techniques
September 28th, 2023 Author: Ryan Morrissey & Annabel Otutu
Tools for Defending Organizations with Advanced Threat Detection and Proactive Security Intelligence
September 21st, 2023 Author: Ryan Morrissey & Annabel Otutu
How does U.S. law protect us against illegal searches and seizures of our digital devices?
June 23rd, 2023 Author: Alexia Bowie
What is it, how do attackers use it and how you can avoid becoming a victim
June 5th, 2023 Author: Ryan Morrissey
In a world of constant cyber-attacks, how can you secure your online life without memorizing hundreds of different passwords?
April 27th, 2023Author: Matt Compton
Computers mimicking human intelligence, what could go wrong?
April 20th, 2023Author: David Thomsen
The mental toll victims endure after they are targeted online
April 11th, 2023Author: Savannah Ciak
When life gives you a pie, make a computer out of it! Celebrate International Pi Day by learning about the revolutionary tiny computers that changed the world of technology.
March 14, 2023Author: Savannah Ciak & Lily Pouliot
The Lack of Representation and How We Can Mitigate It
March 2, 2023Author: Savannah Ciak
Diving into the most advanced censorship program in the world.
February 22, 2023Author: Luke McKay
Who they are and what they have done.
February 16, 2023Author: Lily Pouliot
What is containerization and why should I use it?
February 8, 2023Author: Matt Compton
How one of gaming's biggest franchises became a victim.
January 25, 2023Author: Kevin Pozucek
Scan a website for vulnerabilities from your phone.
June 24, 2022Author: Benji Gifford
A recent money hungry group that encrypts all your information unless a ransom is paid off.
May 24, 2022Author: Eric Burdick
Create, execute and use security tools all on your phone.
May 22, 2022Author: Benji Gifford
Logging is important to keep track of what is wrong with a system. However this does not leave loggers invulnerable to cyberattacks and exploits.
April 21, 2022Author: Eric Burdick
Phones can be used to locate the nearest store or restaurant. But what if it can be used to locate people?
March 30, 2022Author: Eric Burdick
Ever lose your keys? Could you have sworn you left your bag there? By creating the AirTag, a device that has the intention to help you track down your misplaced items, Apple sought to get rid of this problem. But what if the person using it had more malicious purposes?
March 2, 2022Author: Eric Burdick
Do you usually trust the websites you browse to based on how they look? Facebook, Amazon, and Google - they all have a distinct look that you can recognize right away! What would happen if the link you clicked on led to a more malicious, yet familiar, site?
November 30, 2021Author: Eric Burdick
Looks like a thumb drive, types like a keyboard.
November 18, 2021Author: Miranda Pagarelski
While online shopping is convenient, easy, and accessible to most users, the dangers of online shopping may overweigh the benefits. Many people are at risk of having their personal and financial information stolen, so it is important to be aware of online vulnerabilities and know how to keep your private information secured.
November 20, 2020Author: Henry Kenyon
With the COVID-19 pandemic closing many businesses' physical locations, many people are searching for places to work remotely. With only 26% of the United States' workforce working at physical job sites, many people have resorted to working remotely in public to separate their home and work environment. How can you work in public safely? Here’s what you should know.
November 20, 2020Author: Emily Glazier
Technology continues to shift gears into the future and with these changes comes new technological advancements. The use of VoIP can allow users who do not have a cellular connection to make voice communications calls during Internet Protocols.
November 20, 2020Author: Henry Kenyon
As technology advances, internet controlled devices begin to exist beyond just our smartphones and laptops, and are now everywhere, including in our homes through thermostats, door locks, baby monitors, and more. But, as technology increases, the security risks threatening your home increases as well. How safe are your smart home devices, and what can you do to protect your home?
November 13, 2020Author: Emily Glazier, Henry Kenyon
While we have many positives of modern society online, there is a lot of negative activity that is going on in the background. People are having their information stolen while others are being harassed/stalked. There are many that also receive phishing attacks and while those are usually disguised. They are able to get many users to interact with them causing people to become victims of identity theft. Here is the latest on internet threats and what to do about them.
November 13, 2020Author: Emily Glazier, Henry Kenyon
As technology advances, it is important to know how to keep yourself safe while you’re managing social media pages online. It is also important to keep your personal information confidential. This blog post will cover some good tips on how to stay protected online.
October 28, 2020Authors: Emily Glazier, Henry Kenyon
Although any election faces challenges, the 2020 presidential election in the United States enters uncharted waters due to COVID-19 and national shutdown and restrictions around gatherings and settings where people can congregate, such as polling locations. Here’s what to know about COVID-19 and voting, and the cyberthreats surrounding the 2020 election.
October 21, 2020Authors: Emily Glazier, Henry Kenyon
With the boom of social media platforms such as Instagram, TikTok, and Snapchat, more and more users worldwide give out their personal information to companies in order to use their platforms. But, how safe is your information in the hands of social media giants like Facebook, Youtube, and others? And, what’s going on with TikTok, and it’s owner: ByteDance?
September 30, 2020Author: Emily Glazier
As classes and jobs begin to transition from classroom settings to virtual meetings with teachers and coworkers, it is important to be wary of the vulnerabilities that are connected to switching online.
September 23, 2020Author: Nurit Elber
In the new world of remote learning and remote work, it’s more important now than ever to keep your workstation secure! Utilize these tips for a safer workstation.
April 16, 2020Author: Miranda Pagarelski
During these long weeks in quarantine, the government is working to pass the EARN IT bill, but what is the bill and how will it protect people working from home?
April 15, 2020Author: Nurit Elber
Here are a few tips on how to troubleshoot connection issues.
April 14, 2020Author: Miranda Pagarelski
With the internet becoming a more regular part of our lives, what are the ways we can protect our browsers?
April 14, 2020Author: Samuel Barrows
Zoom has become the hot topic in a lot of security news and regular news, but what is really going on? Why is it a big deal?
Updated: April 8, 2020Author: Nurit Elber
How Do I Work Efficiently From Home? Due to the COVID-19 pandemic, many people are moving to remote work and remote learning. Here are a few tips to help with the transition!
Updated: April 1, 2020Authors: Miranda Pagarelski, Nilesh Khetripal
What is a WiFi Pineapple and why should we as Internet users be aware of them? Here are some tips to make sure you aren't falling into a Man-in-the-Middle attack!
Updated: March 25, 2020Author: Nurit Elber