Podcast
-
Episode 14 – Phishing For Selfies
Phishing emails get more complex and clever each day. A new one has surfaced that tries to trick people to send in selfies holding credit cards and IDs. Listen to […]
-
Episode 13 – Start Using A Private VPN
In the increasing drive to collect and sell your Internet browsing data it’s more important to protect your privacy. Using a Private VPN on your computers and mobile devices can […]
-
Episode 12 – Smartphone Security Basics
We all have smartphones but we all don’t secure them the same way or properly. Today we talk about a few basic security steps you can take to make your […]
-
Episode 11 – Are You Worried About Employee Home Security Yet?
As the lines continue to blur between corporate to home to cloud employee’s personal security posture can pose a new risk with corporate assets and data. Are you starting to […]
-
Episode 10 – The Most Dangerous Object In A Security Program
There is one item, if used regularly in a security program, will cause your program to fail. What is this item? Tune in and hear what it is and why […]
-
Episode 9 – Backup Your Files, Now
The most under appreciated process most people do not do regularly or at all. Backing up your files. Everyone will hit a moment when your tech will fail, malware hits […]
-
Episode 8 – Avoid Being A Victim Of Crimes Of Opportunity
Crimes of opportunity are quick, unplanned moments by criminals that see an easy opportunity to steal your items. Simple steps can help you avoid simple yet damaging crimes. Be aware, […]
-
Episode 7 – The Email Worth Millions
Hear about one email turned out to be worth $1.9 million dollars in a very bad way. The CEO Phishing scam strikes again! Be aware, be safe. Website – https://binaryblogger.com Twitter […]
-
Episode 6 – Breaches Are Not Only External
When you hear the word breach most think about an external attack. This is not always the case, you can be breached and have no systems compromised. Be aware, be […]
-
Episode 5 – The Next Evolution Of The Password
NIST (The National Institute of Standards and Technology) have taken steps to eliminate the password for the next evolution of security. Out with passwords, in with Memorized Secret. What are […]

Follow me on Twitter
My Tweets- 3 Best Tools to Convert Binary into Text
- WordPress Updates More Than a Million Sites to Fix Critical Ninja Forms Vulnerability
- US Man Sentenced to Nine Years in Prison for Hacking iCloud Accounts and Stealing Nudes
- Less Than Half of Organizations Have Open Source Security Policy
- How to Start Your Business and Earn Money From Home