Security In The Cloud

I have been critical of the cloud for some time. I’m still don’t like the idea of putting my data on someone else’s computer. You don’t have the usual control over the data. However, I heard an argument recently, that changed my view a bit in favor of the cloud. You don’t do your own… Read more Security In The Cloud

Digital Spring Cleaning

How often do you take a look at all the online accounts you have? I tend to create a lot of online accounts. Most of them are free anyways. I create accounts just to see what a new website is about. Often only using the account once and losing interest. Do you delete these old… Read more Digital Spring Cleaning

Single Point of Failure

It’s a pretty common idea in a lot of fields (business, security, software development, etc..), try to avoid a single point of failure. Don’t create any system that can be completely taken down by one problem. This is the reason I don’t use a password manager. I don’t trust all my security to a single… Read more Single Point of Failure

Privacy In The Cloud

Would you write in a notebook if it came with a warning that there is no guarantee that the ink will stay on the page or the pages won’t spontaneously combust? Or that there is no way to know if other people are reading your notes? That you don’t actually own the information you write… Read more Privacy In The Cloud

Thoughts On Biometric Authentication

I’ve been wanting to write down some thoughts on biometric authentication for a while. It’s becoming more popular and prevalent in the technology we use everyday. And before we actually learn what is good and bad about it from experience, I wanted to write down my opinions.

Sources of Data Breach

Every week/day in the news there is a new attack on individuals or businesses data (emails, credit card information, social security numbers, etc…). These attacks all get categorized as cyber-attacks, but what is the actual source of the attack? Is it malware? A skilled hacker(s)? Social engineering? Outdated software? I want to know what is… Read more Sources of Data Breach