Blog Posts

Protect Yourself Online–Anti-Phishing Toolbar

Today I received an Alert from Google that my name had appeared online. (Being in information security breeds paranoia, so I'd set up  a Google Alert for occurrences of my name online--and for the rest of my family as well!) The Phishing Attempt Here's the Google Alert I received: Ben Woelk (bwoelk) on Twitter Infosec Communicator, Trainer and Policy Analyst ...
Read More

Twitter Use at #STC10 Summit

One of the more surprising things to me at the STC Summit conference this year was the frequent use of Twitter. It was used for arranging informal and "official" Tweetups and for summarizing the content of various sessions. It seemed like there were a lot of different people tweeting, but I wasn't sure how many people were involved and exactly ...
Read More


Leave a Reply

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,201 other subscribers

Categories

Support Introverted Leadership on Patreon

Blubrry affiliate banner