Image for post
Image for post

Social networking sites have revolutionized the way we interact with others, you don’t meet people anymore, nowadays you added them. The features of social media sites differ, but they all have one thing in common, they collect a ton of personal information. Information sharing is encouraged on social media to power the communications that these sites rely on. This is how they can show you matches, interests, and more importantly Ads, which is one of the main revenue sources of social media platforms. …

Image for post
Image for post

A home network usually refers to one that is used to connect devices to the internet usually within someone’s residence, a home network is usually small and for the most part is made up of a Router, Wi-Fi, and in some cases a small switch. Many startup companies or small businesses also have what would be considered a home network architecture.

These networks are usually used to connect all sorts of devices, primarily media consumption and smart things that are designed to improve our quality of life. Unfortunately, this convenience comes at the cost of security.

This should not be…

As a security professional, I have always been an advocate for strong credentials security. I have spent a considerable amount of time coaching others how to handle password management, what a strong password should look like, and of course strategies for using and being able to remember different and random passwords.

The guidelines are not that difficult:

  • Use a password that contains at minimum 8 characters ( 10 or more would be better, and this number will continue to increase as computational power increases and with it a hacker’s ability to forcefully break a password ).
  • Use lower and uppercase…
Image for post
Image for post

Today, hacks, data breaches, and cyberattacks are more common than ever before. Here is a list of some of the organizations and/or government entities who have had a recent breach where consumer data has been exposed.

U.S. Army, P.R Dept. of Health, Ohio State University, JP Morgan Chase, AT&T, Tricare, Steam, Sony, Sega, NHS, Morgan Stanley, Memorial Health Systems, Citigroup, Countrywide Financial Group, TD Bank, Yahoo, Medicare & Medicaid, Dropbox, Blizzard, Twitter, Ubisoft, Target, Snapchat, Facebook, Evernote, Apple, Adobe, UPS, Uber, Google, Domino’s Pizza, Wendy’s, Walmart, Slack, Scottrade, Hyatt Hotels, CVS, Ancestry, Dept. …

Image for post
Image for post

There are about 30 million small businesses in the United States, which accounts for over 99 percent of all the U.S businesses (SBA, 2019). Small business companies create approximately 1.5 million jobs annually, about 64% of new jobs created in the U.S.

Digital transformation is changing the way those businesses can interact with their customers. Whether you want it or not, if you a Small business owner you will have to, at some point embrace it. Across the landscape, companies are making considerable investments in Robotic Process Automation (RPA), Mobile Interaction Technologies, Cloud Services, and Internet of Things technologies (IoT).

Image for post
Image for post
A router, no more, no less.

The preamble.

The need to secure the home network is more important than ever. Enterprise networks with cloud-assisted and machine learning-enabled security features, as well as constant ongoing employee security awareness training are becoming harder to compromise.

The most sophisticated hackers are those that live of the land.

Ever heard the term, take what the defense gives you? It is a term commonly used in the NFL. It refers to the offense not forcing plays that have a low success rate but instead focusing on easier plays that have a higher chance of being successful. …

What is network segmentation?

Network segmentation is a network architecture approach that divides a network into multiple segments often referred to as subnets, each acting as its own smaller network. This allows administrators or owners to control the flow of traffic between these subnets based on policies. Organizations use segmentation to improve monitoring, boost performance, localize technical issues, and most importantly, enhance security. For a long time, segmentation has been used in enterprise and even small businesses to limit the reach of anyone device that is connected to the large network.

English, please?

Let’s say that you go to Starbucks…

Over the past few days, I have been doing a fair amount of research on the subject. I wanted to include in my apps articles that users could find interesting and useful about procrastination.

Image for post
Image for post
Capture from my very own ToDo app which among other things, tracks my procrastination habits. I am not doing great.

Contrary to my simple belief that procrastination is just another word for being lazy, there seems to be a whole lot of complexity surrounding procrastination. I read this article on the Washington Post (included below for all users to read — you’re welcome WP for the free advertisement), which I found profoundly interesting and funny. The article talks about the fear or anxiety about an upcoming…

Image for post
Image for post

Making anything from scratch is hard enough, but to have something you’ve made visible to everyone can be very scary.

When I was in school I was always thought to be intelligent, in retrospect I think I was more of a hard worker than a gifted student. Some of that came from the pressure that resulted from the expectations that I should do well because “I was smart”. Fortunately for me, I always had a thirst for knowledge. I handled the pressure well and worked hard, thus achieving above-average grades.

I recently undertook the task of creating an application from…

JMDevLabs

Application development, process and workflow automation, data analysis, and cyber security.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store