SMBs, SMEs, StartUps, and Cybersecurity

Attention SMBs and Startup owners and founders! Bad actors don't care about your business size; they want your data and money. Yes, they want both. And they are not bothered about your reputation or your customers. They know they have the power to destroy you. Will you let them do that to your business? No? … Continue reading SMBs, SMEs, StartUps, and Cybersecurity

Theme Reveal for A-to-Z Challenge in April

I am excited to share my participation in A to Z blogging challenge kickstarting next month. Since I am a B2B Technical Writer - Cybersecurity. My theme for this year's challenge will be A to Z about Cybersecurity. This year I will take up some new terms with some regular ones you already know or … Continue reading Theme Reveal for A-to-Z Challenge in April

Z is for Zero Trust

Image Source: With increased data leaks and data breaches, the traditional way of protecting or securing infrastructure are outdated. Today the IT experts say to trust no one and verify everyone. Thus, zero trust. But what is Zero Trust? When was the first time this term was used? Who coined the term Zero Trust? … Continue reading Z is for Zero Trust

Y is for Yorick

Image source Ok! For this challenge, I am finding programming languages I have never heard of – maybe because I am not from a technical background. So, I know only those languages that are popular in relation to data science and machine learning. However, here is another programing language, I came across starting with … Continue reading Y is for Yorick

X is for XBase++

Most often than not the world of the Internet, Computers, and Deep Tech have terms starting from letters like X, and Y. So, when I did my research for the terms starting with both X and Y (in the next post), I came across this programing language called XBase++. Image source: What is XBase++? … Continue reading X is for XBase++

W is for Whaling — An Attack on Whales!

Whaling or Whale Phishing or Whaling Phishing, call it whatever you may, it is one of the most well-planned attacks on the whales aka the C-suite executives of an organization. The aim behind Whale Phishing is to trick the executives into doing what the Whale attackers want them to do. That could range from money … Continue reading W is for Whaling — An Attack on Whales!

V is for Virus — Not Corona but Computer!

The same confusion about what to choose for V – Virus or Vishing? But then I thought it is better to concentrate on one and to take up the other for some other time. Your computer is infected with a virus, kindly quarantine it. So, here I am with what is that Virus on your … Continue reading V is for Virus — Not Corona but Computer!

U is for URL Spoofing!

Read the URL carefully here. This is an example of URL Spoofing. Image Source: I am sure you must have received emails stating offers that are too good to be true, either from your favorite holiday destination, or your aviation company. Yes! What did the offer look like or rather what did it read … Continue reading U is for URL Spoofing!