CJN IT Solutions

February 19, 2019
password Lock on Devices

Password Lock On Your Device

Reasons To Have A Password Lock On Your Device. It is time to get rid of the notion that using a password for your devices means […]
February 11, 2019
W is for Worm

W is for Worm

Week 11 of The ABC of Cybersecurity – W is for Worm. It was a cold November night just as you would expect for that time […]
February 4, 2019
V is for Virus

V is for Virus

Week 10 of The ABC of Cybersecurity – V is for Virus. Our retrospective of computer threats started with keyloggers and ransomware, two relatively new malware […]
January 28, 2019
T is for Trojan

T is for Trojan

Week 9 of The ABC of Cybersecurity – T is for Trojan. Say you used to know a Jane some years ago. If you’ve just received […]
January 21, 2019
s is for spyware

S is for Spyware

Week 8 of The ABC of Cybersecurity – S is for Spyware. What if a hacker had front row tickets to your bedroom every evening through […]
January 14, 2019
R is for Ransomware

R is for Ransomware

Week 7 of The ABC of Cybersecurity – R is for Ransomware. Smartphones and computers are becoming increasingly important in our lives. Changing how we chat, […]
January 7, 2019
P is for Phishing

P is for Phishing

Week 6 of The ABC of Cybersecurity – P is for Phishing. P is for Phishing: Your online accounts are part of your digital identity. They’re […]
December 3, 2018
M is for Man-in-the-Middle (MiTM)

M is for Man-in-the-Middle

Week 5 of The ABC of Cybersecurity – M is for Man-in-the-Middle (MiTM) When you request a page, the information travels from the server to your […]
November 26, 2018
K is for Keyloggers

K is for Keyloggers

Week 4 of The ABC of Cybersecurity – K is for Keyloggers Imagine you’re in front of an ATM and the next person in line peers […]
error: Content is protected !!