top of page
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?


Staying Cyber Safe with Good Password Hygiene
Author Elaine Harrison-Neukirch If you use online accounts or apps on mobile devices, you are familiar with passwords. Do you use the...
abdelsyfane
Oct 17, 20223 min read
76 views
0 comments


Facial Recognition: Security & Privacy Implications
In partnership with Breezeline Author Candace Moix Although most of your interactions with facial recognition may enable simple...
abdelsyfane
Oct 3, 20224 min read
253 views
0 comments


Online Gaming - Keep Your Children Safe
In partnership with Breezeline Author Elaine Harrison-Neukirch Online gaming has become the new “arcade” of the 80’s. Kids who game...
abdelsyfane
Sep 6, 20223 min read
51 views
0 comments


What is a Supply Chain Attack?
In partnership with Breezeline Author Elaine Harrison-Neukirch Supply chain attacks are becoming increasingly frequent. These types of...
abdelsyfane
Aug 1, 20223 min read
36 views
0 comments


Two Factor Authentication – Another Layer of Security
In partnership with Breezeline Author Cate Garrett Early in the morning, you finally managed to get your coffee before going to your...
abdelsyfane
Jul 11, 20223 min read
172 views
0 comments

Have You Heard About the Google Voice Scam?
Author: Elaine Harrison-Neukirch Recently, I listed some items for sale on Facebook Marketplace. I received a message in Facebook...
abdelsyfane
May 16, 20222 min read
282 views
0 comments


If You Use the Same Passwords for Every Thing, CHANGE THEM NOW!
Author Eric Tsang After analyzing password attacks using my honeypot, one easy thing you can do to protect yourself is to have strong...
abdelsyfane
May 2, 20225 min read
116 views
0 comments


Security Awareness Month - Resources For Everyone
Author Elaine Harrison-Neukirch In October of 2004, the National Security Alliance and the Department of Homeland Security launched...
abdelsyfane
Oct 4, 20213 min read
187 views
0 comments


Cyberbullying
This blog originally appeared on Dark Shiny Unicorn with the title of “Cyberbullying" (The Love Club: Picture still from a behind the...
Emily Stamm
Apr 5, 20215 min read
84 views
0 comments


Creating a Culture of Caring Through Awareness
Author: Teressa Gehrke Over the last few weeks, I was gathering intel from the SANS Cyber Threat Intelligence Summit; attended the...
Emily Stamm
Mar 1, 20214 min read
132 views
0 comments


Password Managers: A Primer
Author: Kevin Kipp "People are notoriously remiss at achieving sufficient entropy to produce satisfactory passwords." - Troy Hunt...
Emily Stamm
Dec 7, 20202 min read
124 views
0 comments


Phishing: Don't Get Hooked
Author Elaine Harrison-Neukirch Social engineering is used to trick people into divulging confidential information such as username &...
Emily Stamm
Oct 5, 20204 min read
289 views
0 comments

Malware 101: Malware Explained
Malware 101: Malware Explained
abdelsyfane
Aug 10, 20202 min read
182 views
0 comments


Zoom In Or Zoom Out: Should I Use Zoom Or Not?
Should I Use Zoom Or Not?
abdelsyfane
Jul 20, 20203 min read
98 views
0 comments

Charity Fraud - Don't Send Crooks Your COVID-19 Donations
Author Debra R Richardson COVID-19 has created a legitimate need for the community to donate their time, resources, and money to those...
Emily Stamm
Jun 15, 20203 min read
69 views
0 comments


The Most Common Types Of Identity Theft
These are the six most common types of identity theft and what you can do to protect your identity from being compromised
abdelsyfane
Jun 1, 20202 min read
497 views
0 comments


Your Info Is On The Dark Web - What Does That Mean For You?
Your data is on the Dark Web, but there are steps you can take to limit the damage.
abdelsyfane
May 18, 20202 min read
171 views
0 comments


COVID-19 Cyber Safety
How threat actors are utilizing COVID-19 for scams.
Emily Stamm
Apr 1, 20203 min read
97 views
0 comments
bottom of page