I recently read a book titled Cyber Crisis that has a mission to convince every business manager and a person who owns a phone, computer, game console or an electronics device that cybersecurity is everyone’s business. The author Eric Cole, … Read the story...
How to migrate to another Mastodon server
So I decided to move to a new Mastodon server (also known as an instance) that had terms better suitable for one of our foreign language blogs. It is really amazing that a migration function even exists in a social … Read the story...
Cybersecurity trends for small businesses and homes for 2023
While small organizations and home computer users continually learn more about cybersecurity, information technology develops as well. Managers can adopt the latest tools to protect important business data within organizations and family heads can protect sensitive personal data at homes. … Read the story...
Mobile devices you need for staying online on the road
Planning what to pack on a trip can be a tricky task, and if your work involves computers and connectivity, it complicates the task even more. The length of a trip, is it a work or leisure journey, the packing … Read the story...
How does a small business recover from a cyber security incident?
The mantra of cyber security experts is that you shouldn’t make plans thinking if you are hacked, but plan for recovery when you are hacked. Sure, according to studies and statistics it is practically inevitable that especially small … Read the story...
The most successful cyber attack method is triggered by victims themselves
The nasty thing with social engineering is that the victim falls for a scam, and ultimately helps cyber criminals to achieve their goal. Typically they want to break into a large computer system or simply access the victim’s bank account. … Read the story...
The problem with privacy: ideas and real life behavior don’t match
Scientists have researched for years the mismatch of results originating from interviews and surveys, and the actual behavior of people. Something tends to be wrong with the results, although respondents feel they have given accurate answers. This phenomenon is surprisingly … Read the story...
Is social media on a trajectory to become an old-media like gatekeeper?
What a joy it was to realize that it really was possible to publish anything we wanted on a blog, or comment on other people’s blogs. Sharing witty remarks on Twitter and holiday beach photos on Facebook was better than … Read the story...
What small businesses and homes can learn from the Twitter whistleblower
One of the last big decisions Jack Dorsey made before handing over Twitter’s CEO responsibilities to Parag Agrawal was to hire a cybersecurity expert to fix the numerous security problems the company has. Peiter “Mudge” Zatko accepted Dorsey’s offer, and … Read the story...
Have you misunderstood Linux?
Linux is an excellent piece of software, but what exactly is it? Your mobile phone may run Linux if it is powered by Android, the most powerful cloud servers on the internet are powered by Linux, your security camera may … Read the story...