Blog Posts

Avoiding the Botnet Snare

“Why would anyone attack my computer? I don’t have anything of value on it.” Is this your mindset? Although the goal of many attacks may be identity theft or financial gain, there are other reasons for someone to attack your computer. Of the many types of malware (malicious software) attacks, one of the most serious is someone installing remote control ...

Updated: 2012 Speaking Schedule, January through June

I'll be speaking at the following events this winter and spring. Watch for my presentation materials on SlideShare. January 9: HEISC (Higher Education Information Security Council), Town Hall. Recording available. January 30:  Bullet Proofing Your Career Online (with Hannah Morgan, @careersherpa), ABCPNG (Always Be Connecting Power Networking Group), First Unitarian Church, Rochester, New York Description: What are the 10 key ...

Making Information Security Fun

I shared this presentation at the October program meeting of the Rochester Chapter of the Society for Technical Communication. The presentation demonstrates how the Information Security Office at the Rochester Institute of Technology used marketing techniques to reinforce key messages to raise awareness around information security concerns such as phishing. To see more about how we're using blogging to raise ...

Announcing the RIT Cyber Self Defense Student Blog

I teach a section of Cyber Self Defense, a security awareness course at the Rochester Institute of Technology. We always have a number of interesting discussions about current infosec issues. I believe these discussions would be of interest to a wider audience, and especially to readers of the Infosec Communicator blog. This fall, we've created a blog for the students ...

Top Ten Tips for Safe(r) Social Networking

Did you know you’re a target every time you go online? Did you know that cyber criminals are targeting social networking sites? Do you know how to recognize a phishing attempt? Following these tips will help make your use of social networking sites safer. (Unfortunately, there’s no way to guarantee that you can use them safely.) Tip #1: Use strong ...

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,235 other subscribers

Categories

Support Introverted Leadership on Patreon

Blubrry affiliate banner