Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Memberships

Learn Online Security

34 members • Free

3 contributions to Learn Online Security
There is a shark in the water...^...
One problem with constantly focusing on security issues is that we become a negative voice. Every post is, "watch out for this", "these people are coming after you". I recently spoke with another podcast host who has the same problem. We decided that some, maybe not all, of the topics can be covered with a focus on hope or self-improvement vs. "the sky is falling". The other problem is that doom-and-gloom content gets more views. I would rather provide you with hope and a lifeboat than a finger pointing at a shark. What do you think?
4 likes • 9d
Totally agreed! Unfortunately most security and scam content comes across as negative because of the subject matter. Personally, I am tired of the doom and gloom as we see a lot of it online! Would love to see more of a focus on the positive.
De-cluttering is all the rage.
What happens when that impromptu 10-minute power clean turns into a data breach? When it comes to business security, most owners focus on software, firewalls, and encryption. But one often-overlooked risk lies in how people handle devices at the end of their life—from old laptops and phones to printers and fax machines. Every device that stores or transmits information is a potential leak point, and the human factor plays a critical role in keeping that data safe. What device were you surprised to learn was a potential security risk?
2 likes • 23d
@Brayden S Agreed! With less people owning printers these days, using public printers is so common. The library I go to for printing almost always has a line. Makes me wonder how much info is on that device :O
Don't miss the attack
Most of the time we focus on the hack or scam or theft and forget that there is a bigger picture here. We have to see the attack as a process and not a simple event. There are preplanned, well thought out, processes. The earlier we can pick up on the process, the quicker we can thwart the attack.
Don't miss the attack
3 likes • Sep 22
Totally! I have seen a hack where the hackers were in our system for months before they ever actually did anything. They spent the time in our system researching the business and figuring out the best way to use their access to try and get money out of the company.
1-3 of 3
Dallas Jansen
2
11points to level up
@dallas-jansen-3020
Hello

Active 4d ago
Joined Sep 11, 2025