(405) 919-9901

Computer bathtime, part 3: hardware and software security

Critical Security Control #3, as proposed by the Center for Internet Security (CIS), is called Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. This nerdy, wordy tome is written mainly for I.T. security pros and...

Computer bathtime, part 2: critical security controls

Continuing last week’s discussion of “Foundational cyber hygiene,” let’s look at the first five “Critical Security Controls” proposed by the Center for Internet Security (CIS). A good understanding of these controls is important to your safety on the Internet. The...

Foundational cyber hygiene: computer bathtime

“Critical Security Controls,” a phrase coined by the Center for Internet Security (CIS), is a high-tech, nerdy way of saying, “super-important things you really, really, really, really need to do.” They’re not kidding around, either; you really do need to do them. The...

Dave’s Three Immutable Laws of Hacking

I am using this week’s column as an opportunity to announce three “laws” that are so obvious to me I’m surprised nobody has announced them before. If they have been announced before, I can’t find them. Therefore, here I go. Behold, the worldwide introduction of Dave’s...

Beware, search results not always as they seem, Part Three

Columns of the past two weeks have been prep work for what you read today. Knowing what search engines, Internet searches and browsers actually are and how they function is critical to staying out of trouble on the Internet. Today: how the Internet bad guys trick...