(Modified:
2025-01-13)
— Written by
SimeonOnSecurity— 3 min read
Learn how to secure your workstations and protect sensitive information with this comprehensive guide based on NIST’s recommendations for implementing strong access controls, keeping software up-to-date, using antivirus software, enabling firewall protection, implementing data encryption, and regularly backing up data.
(Modified:
2025-01-13)
— Written by
SimeonOnSecurity— 3 min read
This article explores the benefits and drawbacks of obtaining a degree in the fields of cybersecurity and system administration, including job opportunities, certifications, time, and cost considerations.
(Modified:
2025-01-13)
— Written by
SimeonOnSecurity— 3 min read
This article discusses the dangers of storing cryptocurrency on exchanges, explaining why it is equivalent to storing money in a mattress, and highlights the benefits of using a hardware wallet for secure storage.
(Modified:
2025-01-13)
— Written by
SimeonOnSecurity— 6 min read
The DoD 5220.22-M specification is a critical standard for securely erasing sensitive information from digital storage media, widely used by the U.S. military and government organizations.
(Modified:
2025-01-13)
— Written by
SimeonOnSecurity— 3 min read
The DoD 5220.22-M specification is a critical standard for securely erasing sensitive information from digital storage media, widely used by the U.S. military and government organizations.