#SMB #CyberAwareness #SecurityBasics #InfoSec
Quick self-audit you can do in under 15 minutes:
- List running services
- Ask: “Do I still need this?”
- Disable or document anything you forgot existed
Less running = less risk.
Ein abgelaufenes Code-Signing-Zertifikat legt unter macOS Logitech-Tools lahm:
Keine App → keine Maus- & Tastatur-Profile → Produktivität im Eimer.
Der Vorfall zeigt: Zertifikats- & Update-Management sind kritische Infrastruktur.
Security scheitert nicht immer an Hackern, sondern oft an ablaufenden Basics.
#ITSecurity #CodeSigning #SupplyChainSecurity #macOS #Logitech #PKI #SecurityBasics #DevOps
Aktuelle IT-Security-Realität 2026:
Angriffe werden automatisierter, Phishing persönlicher und Leaks entstehen oft durch Fehlkonfigurationen, nicht durch Zero-Days.
Wer heute sicher sein will, braucht weniger „Hype-Tools“ und mehr Grundhygiene, Monitoring und Schulung.
#ITSecurity #CyberSecurity #Phishing #CloudSecurity #ZeroTrust #Awareness #SecurityBasics
Information Security 101: Principles & Practices
This introductory session delves into the fundamental principles and emerging trends in information security, focusing on individual risk management and resiliency. Led by Devesh Chande, nullNEU's Director of Learning Initiatives, you'll dive into practical real-world techniques that you can use to improve your digital security.
📅 Date: November 8th, 2024
🕒 Time: 6 PM Onwards
📍 Venue: West Village G-104, Northeastern University
🎯 Learning Outcomes:
✅ Fundamentals of Information Security
✅ Threat Modeling
✅ Analysis of Real-World Security Engagements
✅ Preventative and Response Protocols
🖥️ Important: Bring your laptop to tag along with the interactive demos and exercises!
This event is tailored for individuals eager to empower their digital identities with a deep dive into the fundamentals of information security. Don't miss this opportunity to:
• Gain Insights on Assessing & Mitigating Risks
• Participate in Live Demonstrations
• Network with Fellow Students and Cybersecurity Professionals
• Engaging Q&A session
Seats are limited! Register now on our LinkedIn to secure your spot:
https://www.linkedin.com/events/informationsecurity101-principl7258196195670470656/
#Cybersecurity101 #TechCareers #SecurityBasics #HandsOnLearning #CyberSecurityJourney #TechEducation #NUCybersecurity
cc: @null0x00
🦩 "Good morning security flock! *stretches one leg elegantly*
Sasha here, doing my morning TCP/IP exercises - you know, the Three-Way Stretch Protocol! Speaking of basics, did you know that just like flamingos learn to balance on one leg before attempting synchronized swimming, security pros need to master their fundamentals?
Fun Flamingo Fact: We flamingos filter-feed by standing on one leg. Similarly, good security isn't about applying ALL the fancy filters at once - it's about understanding each layer and how it works!
*pauses flamingo yoga to share wisdom*
Things that make Sasha sad:
- People thinking containers automagically fix vulnerabilities
- Forgetting how email actually travels across networks
- Missing out on #BSidesChicago tickets!
Things that make Sasha dance:
- When you can explain TCP vs UDP without mentioning encryption 😉
- Understanding why logging is your best friend
- Getting your BSidesChicago ticket and joining our flock!
Remember: Just as baby flamingos start pink and get pinker, security knowledge grows stronger with good fundamentals and continuous learning!
Ready to join our security waddle? Grab your BSidesChicago tickets at https://events.humanitix.com/bsideschicago-2024!
*goes back to practicing secure network choreography*
In this video series I'm going to explain security basics.
Because we can do a big job on security, but it just won't work if you don't cover the basics.
First things first: passwords.
#SecurityBasics #DigitalSecurity #Cybersecurity #Shield #ShieldDigitalSecurity #PasswordSecurity #DataProtection #OnlineSafety #CyberAwareness #SecurePasswords #InfoSec101 #PrivacyMatters #SecureDigitalLife
Exploring malicious Windows drivers (Part 1): Introduction to the kernel and drivers Drivers have long been of interest to threat actors, whether they are exploiting vulnerable drivers or creating malicious ones. Malicious drivers are difficult to detect and successfully leveraging one can give an attacker full access to a system.
I never wrote a proper #introduction so here goes.
I have been working in "IT" for over 15 years. Starting all the way at the bottom and working my way up.
I mostly work in small and medium sized business as a security professional. Helping them to uplift their security posture. This involves a lot of education around the basics and what is and isn't good practise and/or value for money.
Being in that space does mean I still do a lot of "traditional" IT work (i.e. IT Ops). I really enjoy the variety that brings.
Outside of work I play video games, dabble in 3D printing and home automation.
Other people tell me I'm a foodie, so I guess I am. I'd probably describe myself more as a dessert aficionado 😋
I'm #nonbinary and prefer they/them. But won't get upset at you if you forget.
#PlayStation #VR #InfoSec #SecurityBasics #3DPrinting #HomeAutomation #Dessert #Foodie #ITSecurity #ITOps