5 Cybersecurity Issues to Watch in 2024

January 28, 2024 — Jt Spratley

Between the IBM HBCU Ambassador program, cybersecurity specialists active on social media, and personal research, there are a few cybersecurity issues discussed enough that we need to keep a closer watch on daily.

Read more...

Comments? Tweet  

Saw X Was Great, Until the End

December 13, 2023 — Jt Spratley

I've been a fan of Liongate's Saw franchise for years, not because of the gore, but because of the stories behind the traps which influence victims' decisions. I know, many people have a hard time getting past the red room-esque murder scenes. Each Saw movie, including Chris Rock's "Spiral," has at least one sociopolitical theme that was prominent around the time of its release, though. Saw X, whether intentional or not, had some tropes that bother me. Spoilers ahead.

Read more...

Comments? Tweet  

Safe, Secure, and Trustworthy Artificial Intelligence But Not For You

November 02, 2023 — Jt Spratley

In 2023, the Biden-Harris administration quietly released an Artificial Intelligence (AI) Bill of Rights and executive order on securing AI. Both are quite long reads. Although I share my thoughts on them below, I recommend reading both if you're interested in the topic.

Read more...

Comments? Tweet  

Pacemakers, Medical Devices, and Cyberbiosecurity

September 28, 2023 — Jt Spratley

Pacemakers are one of the most commonly used medical embedded systems in homes today. With the strides in wireless networking, pacemakers have evolved into mobile electrocardiogram (ECG/EKG) machines, tracking patients' cardio activity remotely to assist doctors with heart health treatments [1]. These now networked embedded systems are unfortunately developed without serious effort given to cybersecurity. There have been many incidents within the past decade highlighting such vulnerabilities and their potentially fatal effects.

Read more...

Comments? Tweet  

Norfolk State University (NSU) IBM Partnership

August 10, 2023 — Jt Spratley

In September 2022, Norfolk State University (NSU) released a news post announcing the IBM NSU cybersecurity partnership. This is part of Biden-Harris' White House initiative to allot more resources and professional development opportunities to students within Historically Black Colleges and Universities (HBCUs), specifically related to information technology (IT). Four months later, I was entrusted with the role as IBM NSU student ambassador. I've since completed many free IBM courses and released content in an effort to bring more HBCU students' attention to these resources. Course topics include cybersecurity, artificial intelligence (AI), cloud computing, IBM products, and more.

Read more...

Comments? Tweet  

What is an IBM HBCU Ambassador?

July 17, 2023 — Jt Spratley

Starting with the basics, what is an HBCU? "HBCU" stands for "Historically Black College and University" (in the USA). How many HBCUs are there? At least 100, mostly in the south-eastern US. You likely know of the IBM technology corporation. But what is an IBM HBCU ambassador, and why is it important for native Black Americans?

Read more...

Comments? Tweet  

From the PPW and ERB to Veteran Badges?

June 14, 2023 — Jt Spratley

Army veterans understand the importance of making sure your authorized awards match your Army promotion points, promotion point worksheet (PPW) and other paperwork. Those awards and badges provide a snapshot of your experiences. Once you leave the service, that concept is still applicable to some business ventures and career goals.

Read more...

Comments? Tweet  

How to Manage Email

June 14, 2023 — Jt Spratley

Electronic mail isn't going away anytime soon, no matter how many social media platforms and other businesses integrate private messaging systems. Below are a few tips to lessen the dread you might feel when looking at your inbox. No matter how long you wait to check, "you've got mail."

Read more...

Comments? Tweet  

10 Cybersecurity Specialists to Follow

April 13, 2023 — Jt Spratley

Most of what I learn about cybersecurity comes from personal research to solve issues and the ten cybersecurity specialists listed below on Twitter.

Read more...

Comments? Tweet  

How Military Veterans Can Protect Themselves From Phishing and Other Online Scams

April 13, 2023 — Jt Spratley

Military veterans are prime targets for personally identifiable information (PII). Businesses seek our Post 9/11 GI Bill because it's sure money. Employers see us as tax breaks. For as many benefits as we get between Veterans Affairs (VA) and the GI Bill, plenty others get an interesting bit of benefits from our presence. This is one of many reasons as to why military service members must be careful of how we share our military info.

Don't worry, non-technical folks, as I've done my best to simplify the best security practices, these days sometimes called the "Zero Trust" mindset, that I'll recommend in the key takeaways and video below. The overall solution: verify contacts supposedly from VA medical centers and community-based outpatient clinics (CBOCs).

Read more...

Comments? Tweet  

Security-Focused Operating Systems

April 12, 2023 — Jt Spratley

The world has reached a point where the frequency of cyber attacks is gradually influencing people to choose security over convenience and bleeding edge technology. Many are switching from Android smartphones to iPhones or basic flip phones, sometimes referred to as "feature phones." Some are replacing Windows personal computers (PCs) with Apple MacBooks. Individuals more serious about cybersecurity are migrating to Unix-based operating systems (OSes). The reason why is simple. Windows is attacked at a significantly higher rate than macOS, Linux, and other Unix-based OSes combined because it is most prominent in homes and corporate offices. According to DistroWatch.com, there are over three hundred BSD and Linux OSes, but few are built specifically with the goal of increased high security and privacy [1]. Two of the most interesting security-focused OSes in active development today: OpenBSD and Qubes OS.

Read more...

Comments? Tweet  

How to Protect Company Data and Why It Might Not Be Enough

April 12, 2023 — Jt Spratley

Protecting the company's data and physical assets is everyone's job, much like customer service. Laws and regulations are reactive deterrents that require user activity to take effect. Physical and information security measures also depend on users, but no one is perfect all the time. That is where information technology (IT) solutions come in. There is a plethora of IT solutions, specifically "technical controls," which "can enable and/or amplify policy enforcement where human behavior is difficult to regulate" [1].

Read more...

Comments? Tweet  

Internet of Things (IoT) and Digital Forensics

April 12, 2023 — Jt Spratley

Amazon Alexa devices, smart doorbells, and Wi-Fi enabled pace-makers have a few notable similarities. First, they simplify and automate redundant, necessary tasks for many Americans' lifestyle, security, and health. Second, they're all available at an affordable price, even after the COVID-19 pandemic. Most importantly, they're extremely portable wireless technologies capable of communicating with common consumer electronics including personal computers (PCs) and smartphones via wireless and cabled connections. That is the glory of “smart devices,” formally known as Internet of Things (IoT) devices.

Read more...

Comments? Tweet  

After You Graduate From College

January 01, 2023 — Jt Spratley

Congratulations, you've graduated from your university and are looking to capitalize on your new credential. Hopefully, you've done all of the things. Before you ditch your school login credentials, there are few things you should do first.

Read more...

Comments? Tweet  

Drupal Security Tips

November 23, 2022 — Jt Spratley

Drupal is quite secure from the start. Admittedly, I don't have deep experience with the Drupal content management system (CMS). I've only used it for testing features and comparing workflows to other website builders and applications. I like the Burndown kanban Drupal module. I know enough to help a new Drupal site owner who understands the importance of being proactive with website security. Below are some basic security recommendations.

Read more...

Comments? Tweet  

Black Entrepreneurs, What if Shopify Goes Down?

October 15, 2022 — Jt Spratley

This is not an inside scoop. It is a hypothetical case.

If you actively work on information security (InfoSec) at any point, you'll end up working on a disaster recovery (DR) and business continuity (BC) plan to maintain operations when the unexpected happens. You'll likely improve your system backup process or add security features. Hopefully, you at some point realize address the need for a backup plan in case your primary IT solution shuts down permanently.

Read more...

Comments? Tweet  

Home Network Security Basics

August 25, 2022 — Jt Spratley

Whether you're starting college or working on a new business, you'll benefit from applying basic best security practices. I'm going to simplify everything you should have on your personal computer (PC), why, and with recommendations so you're not left to figure it out on your own. Follow this cybersecurity guide and become less likely to be a victim.

Read more...

Comments? Tweet  

Black Owned Businesses Need to Do These Things

July 04, 2022 — Jt Spratley

I've learned a lot about how black entrepreneurs approach digital marketing since starting to support black-owned businesses, starting with D'iyanu, a few years ago. After purchasing products from over a dozen black-owned small businesses, I've realized some common mistakes that I'd like to share with everyone. I hope this helps small and medium-sized business (SMB) owners rethink how they approach digital marketing.

Read more...

Comments? Tweet  

Bashblog Security

August 28, 2021 — Jt Spratley

You're likely thinking one of the following:

  • There's not much to securing a static site generator (SSG)
  • The writer is spilling all their secrets
  • What is Bashblog?

Yes, Bashblog is a static site generator. No, there isn't much to securing the Bashblog SSG by default. But embedded code and man-in-the-middle (MITM) attacks can cause vulnerabilities. You still have to harden the web server, especially if you run other services on your system. And to be fair, everything I mention below is public knowledge, if you know where to look. I'm going to show you where to look.

Read more...

Comments? Tweet  

WordPress Security Tips

July 17, 2021 — Jt Spratley

I know quite many people who love WordPress. I'm talking the self-hosted WordPress.org website builder you have to install on a web hosting server, not WordPress.com. But I don't hear them talk much about WordPress security.

I've mentioned some of the stuff below in other blogs about my favorite WordPress plugins and unnecessary plugins. And I don't want this to be verbose. So I'll try to keep everything straight-forward for newbies.

Read more...

Comments? Tweet  

My Favorite Falkon Web Browser Features

September 11, 2020 — Jt Spratley

Falkon, formerly known as Qupzilla, is a Chromium-based web browser for the KDE desktop environment (DE). Qupzilla was buggy and crashed at random when I tried it as a Linux newbie years ago. Falkon is a stable browser that makes compliments my needs for privacy and user experience (UX). I recommend it for anyone looking to try something new. Below are my four favorite Falkon browser features and extensions.

Read more...

Comments? Tweet  

Matomo Analytics is Great-After I Remove Cookies

September 07, 2020 — Jt Spratley

When I started looking into ways to improve visitor's privacy on my websites, I found 2 mysterious cookies with my browser developer tools (browser tab). When I looked them up, a WordPress GDPR plugin forum stated they were from Matomo Analytics. I confirmed the names of the cookies with Matomo's FAQ page: What are the cookies created by Matomo JavaScript Tracking client?

Read more...

Comments? Tweet  

Creating RIPEMD-160 Checksums in Linux

August 29, 2020 — Jt Spratley

RIPEMD (RIPE Message Digest) isn't as popular as SHA and MD5 for creating cryptographic hashes, or checksums. But I got curious after reading about it during some cybersecurity training. The md5sum and sha (256, 512, etc.) command-line hash (CLI) tools are pre-installed on many Linux distros. But I didn't see one for RIPEMD.

Read more...

Comments? Tweet  

Cybersecurity Victim Blame Game

August 07, 2020 — Jt Spratley

After reading "It's Time to Stop the Victim Blame Game" on DarkReading.com, I had to rethink some of my personal shopping rules. This part stuck out to me:

Read more...

Comments? Tweet  

Upgrade-Movie Review

June 14, 2020 — Jt Spratley

I watched this move twice before starting this blog. I’d watched it four times by the time I finished it.

Okay, Upgrade movie.

Read more...

Comments? Tweet  

5 Best WordPress Plugins For My Goals

June 14, 2020 — Jt Spratley

I’ve played with a lot of WordPress plugins. Some were good for convenience. Some were made obsolete with Gutenberg. Some became favorites as I learned how to integrate WordPress with so many different projects – podcasting, forums, school projects, web development, etc.

Below are 5 WordPress plugins I love and why.

Read more...

Comments? Tweet  

Don’t Spread That Hoax!

June 07, 2020 — Jt Spratley

First published on March 17, 2015

If you ever get bored, check out “Nonprofit.net/hoax – Don’t Spread That Hoax” for some random trivia, entertainment, myths, IT fun facts, and plenty of useless knowledge.

Read more...

Comments? Tweet  

Computer Hard Drives-Keep, Wipe, and/or Destroy

June 07, 2020 — Jt Spratley

First published on May 15, 2015

Whenever you sell a computer, don’t simply leave the hard drive with all your data easily recoverable. Ensure you keep the hard drive (HD) as a backup or external drive, wipe it properly so the data can’t be recovered, or destroy it completely with hammers, drills, and other manly stuff. I was on Craigslist earlier searching for a cheap laptop to buy so I can play with Linux. I found a guy looking to sell two laptops for ~$70 simply because his ex-girlfriend changed the log-in passwords. Hard Drives – Keep, wipe, and/or destroy it. But don’t simply give it, and all your information, away for free. Your credit score and mindset will thank you later.

Read more...

Comments? Tweet  

What is Your Computer telling the Internet Right Now? BrowserSpy Answers

June 05, 2020 — Jt Spratley

First published on September 10, 2015

If last weeks post spiked your interest in web security, privacy, and tracking, you should check out http://browserspy.dk/. Simply visit the site and the tabs (tests) on the left will educate you on what information your web browser is sharing.

I’m sure you’ll be surprised.

Read more...

Comments? Tweet  

Unshorten that Tiny URL with UnShortening Tools

June 05, 2020 — Jt Spratley

First published on September 21, 2015

Have you ever been on Facebook or Twitter and seen a short website address provided by a source that’s not completely professionally verified? For example, https://bit.ly/2AvtgLn. Called shortened or tiny URLs, it can save space anywhere, but it also hides the origin of the source.

Read more...

Comments? Tweet  

Handling Bad Hard Drives (HDD or SSD)

June 04, 2020 — Jt Spratley

First published on November 30, 2015

When you’re experiencing computer issues due to a failing hard drive, you have options:

Read more...

Comments? Tweet  

5 Things I Learned from Using Google Ads

June 03, 2020 — Jt Spratley

First published on September 19, 2016

Adsense / Google Ads

Read more...

Comments? Tweet  

12 Types of WordPress Plugins You Don’t Need

June 01, 2020 — Jt Spratley

First published on April 20, 2020

I’ve said this a few times in the past, but my goals to improve my WordPress blog taught me HTML and web design. I’ve downloaded a lot of WordPress plugins for extra features without knowing I could’ve achieved the same goal with a few lines of HTML or editing a file that already exists.

Read more...

Comments? Tweet  

5 Directories Linux Users Should Back Up

May 24, 2020 — Jt Spratley

Last updated on March 28, 2017

It’s always good to know what you need to back up before wiping a hard drive, whether you’re upgrading to a newer version of a distro (generally safer) or distro hopping (which I have 5 good reasons for doing a lot of).

Here’s a cheat sheet to help ensure you don’t forget anything.

Read more...

Comments? Tweet