Entries by Keith Parnell

Who? And who?

It’s funny how we can get lost in our little corner and fall into believing that we are the majority and our way of thinking is commonplace.

Hit me!

Newsletters feed my creative mind. I get ideas from a lot of places, and email newsletters is one of the key sources.

Phishing vulnerability in cybersecurity

Phishing attacks come from scammers disguised as trustworthy sources and can facilitate access to all types of sensitive data. As technologies evolve, so do cyberattacks. Let’s talk about a couple of the most pervasive types of phishing.

Password vulnerability in cybersecurity

A common tactic cybercriminals employ is to brute force their way into a network by guessing end-user credentials. It is important to understand best practices so that login information cannot be easily exploited to gain access to a computer or network.