Mitigating Malware

Is a worm a virus? The answer is No. A worm is not a virus, although, like a virus, it can severely disrupt IT operations and cause data loss. A worm is much more severe than a virus because once it...

Viruses, worms, and trojans

  1. Malware End devices such as computers, phones, tablets, and printers are particularly vulnerable to malware attacks. Therefore, this topic focuses on threats to end devices.Malware is short...

What kind of hacker are you?

The difference between them What is a hacker? The term ‘hacker’ does not necessarily have a negative connotation. For the original generation of hackers, it represented a blend of technical expertise...

EU Dora & How to be Compliant

This is how to comply with the new EU regulation. Digital Operational Resilience Act  The Digital Operational Resilience Act (DORA) is an EU regulation that entered into force on 16 January 2023 and...

Google’s Quantum AI – $5 mill project

This is What Happened.   Quantum computers use quantum physics to access computational abilities that are different from classical computers. Google Quantum AI is exploring potential applications for...

Objectives of Cyber Threat Intelligence

A quick Google search for an answer will return many variations. Some will make sense to you, and some will not. Cyber threat intelligence (CTI) is gathering information from various sources about...

Backing up your data

Jepp, you are correct. A quick Google search for your data backup will give you 49 million results. You will then wonder why I would write an article on Medium. I am creating this guide to simplify...