The Loistava website is located here: https://loistavainfosecurity.com/
On LinkedIn: https://www.linkedin.com/in/tonycollette/
Have you lost trust in your internet service provider (ISP) to keep your personal information private?
Using a high-quality VPN is a potent and effective protest.
“NO!” is a complete sentence.
loistavainfosecurity.com/vpn-use-as-a...
Have you lost trust in your internet service provider (ISP) to keep your personal information private?
Using a high-quality VPN is a potent and effective protest.
“NO!” is a complete sentence.
loistavainfosecurity.com/vpn-use-as-a...
Australia declared war on an unlikely enemy: emus. The flightless birds were causing havoc in Western Australia, destroying crops and fences, and the government decided "enough."
https://loistavainfosecurity.com/the-great-emu-war-of-1932-%f0%9f%87%a6%f0%9f%87%ba/
Australia declared war on an unlikely enemy: emus. The flightless birds were causing havoc in Western Australia, destroying crops and fences, and the government decided "enough."
https://loistavainfosecurity.com/the-great-emu-war-of-1932-%f0%9f%87%a6%f0%9f%87%ba/
☑️ Almost 40% of Americans Use Embarrassing Passwords
☑️ What insights do you find when you ask 1,030 Americans about their password use?
How many people are embarrassed to say their password out loud?
https://loistavainfosecurity.com/naughty-or-nice/
☑️ Almost 40% of Americans Use Embarrassing Passwords
☑️ What insights do you find when you ask 1,030 Americans about their password use?
How many people are embarrassed to say their password out loud?
https://loistavainfosecurity.com/naughty-or-nice/
Fun, Kinetic, Colorful: a matching set of 14 large dice. When rolled together, they create modern passwords composed of uppercase letters, lower case letters, numbers, and special characters.
https://loistavainfosecurity.com/castalot-dice/
Fun, Kinetic, Colorful: a matching set of 14 large dice. When rolled together, they create modern passwords composed of uppercase letters, lower case letters, numbers, and special characters.
https://loistavainfosecurity.com/castalot-dice/
Learn the history of DiceWare, and see an updated concept for this rock-solid technology used to create passphrases.
https://loistavainfosecurity.com/ghentware/
Learn the history of DiceWare, and see an updated concept for this rock-solid technology used to create passphrases.
https://loistavainfosecurity.com/ghentware/
In Your Organization, You Define “The Basics”
Find the sweet spot between everything that’s possible and what your users are willing and able to do.
Blogpost link: https://loistavainfosecurity.com/brilliant/
In Your Organization, You Define “The Basics”
Find the sweet spot between everything that’s possible and what your users are willing and able to do.
Blogpost link: https://loistavainfosecurity.com/brilliant/
Here's guidance on cybersecurity best practices that anyone – regardless of experience – can implement to make their online life safer and more secure.
https://loistavainfosecurity.com/about-us/information-security-for-the-masses/
Here's guidance on cybersecurity best practices that anyone – regardless of experience – can implement to make their online life safer and more secure.
https://loistavainfosecurity.com/about-us/information-security-for-the-masses/
The messaging I heard simply wasn’t persuasive.
But eventually I tried a Password Manager.
Now I’m a raving fan.
https://loistavainfosecurity.com/use-a-password-manager-no-way/
https://loistavainfosecurity.com/about-us/information-security-for-the-masses/
The messaging I heard simply wasn’t persuasive.
But eventually I tried a Password Manager.
Now I’m a raving fan.
https://loistavainfosecurity.com/use-a-password-manager-no-way/
https://loistavainfosecurity.com/about-us/information-security-for-the-masses/
We think the missing element in this entire dynamic is . . . physicality.
A physical product that can focus attention and act as a catalyst for change.
https://loistavainfosecurity.com/about-us/the-place-of-physical-products-in-cybersecurity/
We think the missing element in this entire dynamic is . . . physicality.
A physical product that can focus attention and act as a catalyst for change.
https://loistavainfosecurity.com/about-us/the-place-of-physical-products-in-cybersecurity/
Great fun and many learnings at the National Cybersecurity Alliance Convene Conference in Seattle.
THANK YOU to Mark Petersen of ISSA Puget Sound for allowing us to debut Cyber Fortune Cookies™
#CyberFortuneCookies
https://loistavainfosecurity.com/convene-seattle-2024/
Great fun and many learnings at the National Cybersecurity Alliance Convene Conference in Seattle.
THANK YOU to Mark Petersen of ISSA Puget Sound for allowing us to debut Cyber Fortune Cookies™
#CyberFortuneCookies
https://loistavainfosecurity.com/convene-seattle-2024/
1Password ranked various password styles from worst to best, from the *least costly* to the *most costly* to crack.
Care to guess which was the clear winner?
https://loistavainfosecurity.com/all-passwords-are-definitely-not-created-equal/
1Password ranked various password styles from worst to best, from the *least costly* to the *most costly* to crack.
Care to guess which was the clear winner?
https://loistavainfosecurity.com/all-passwords-are-definitely-not-created-equal/
Hackers ripped off Avery Hartmans for $10,000.
3 weeks before her wedding, she was saddled with $9,778.24 in debt.
You don’t have to be “somebody special” to wind up on the receiving end of digital fraud.
https://loistavainfosecurity.com/psycho-bunny-to-the-rescue/
Hackers ripped off Avery Hartmans for $10,000.
3 weeks before her wedding, she was saddled with $9,778.24 in debt.
You don’t have to be “somebody special” to wind up on the receiving end of digital fraud.
https://loistavainfosecurity.com/psycho-bunny-to-the-rescue/
In 2022, KnowBe4 released its first e-book covering password attacks, defenses and what your corporate password policy should be.
Does their advice still apply today?
Blogpost link: https://loistavainfosecurity.com/knowbe4-password-policy/
In 2022, KnowBe4 released its first e-book covering password attacks, defenses and what your corporate password policy should be.
Does their advice still apply today?
Blogpost link: https://loistavainfosecurity.com/knowbe4-password-policy/
Eva Galperin helps debunk some common myths about cybersecurity, using clear language that's easy to understand.
Eva is the Director of Cybersecurity at the Electronic Frontier Foundation (EFF).
https://loistavainfosecurity.com/debunking-cybersecurity-myths/
Eva Galperin helps debunk some common myths about cybersecurity, using clear language that's easy to understand.
Eva is the Director of Cybersecurity at the Electronic Frontier Foundation (EFF).
https://loistavainfosecurity.com/debunking-cybersecurity-myths/
How MSPs Can Make Cyber Concepts Tangible
Here’s a big “Thank You” to Matt Fisch for inviting me to appear on the FortMesa MSP Cyber Roundtable.
https://loistavainfosecurity.com/bridging-the-cybersecurity-knowledge-gap-for-consumers/
How MSPs Can Make Cyber Concepts Tangible
Here’s a big “Thank You” to Matt Fisch for inviting me to appear on the FortMesa MSP Cyber Roundtable.
https://loistavainfosecurity.com/bridging-the-cybersecurity-knowledge-gap-for-consumers/
☑️ Why do these characters and images resonate with consumers?
The Human OS is complex, but not a total mystery
https://www.visualcapitalist.com/the-worlds-top-media-franchises-by-all-time-revenue/
☑️ Why do these characters and images resonate with consumers?
The Human OS is complex, but not a total mystery
https://www.visualcapitalist.com/the-worlds-top-media-franchises-by-all-time-revenue/
Wanna buy some *really* expensive peanut butter?
For a modest investment of $1,069.00, you too can acquire a tasty 3-pak of NIST Standard Reference Peanut Butter.
Blogpost link: https://loistavainfosecurity.com/passwords-and-peanut-butter/
Wanna buy some *really* expensive peanut butter?
For a modest investment of $1,069.00, you too can acquire a tasty 3-pak of NIST Standard Reference Peanut Butter.
Blogpost link: https://loistavainfosecurity.com/passwords-and-peanut-butter/
The origin story of the name "Bluetooth" is a fascinating tale that connects Viking history, the English civil war, and a curious saga of scattered bones.
https://loistavainfosecurity.com/bluetooth-ever-wonder-where-that-name-came-from/
The origin story of the name "Bluetooth" is a fascinating tale that connects Viking history, the English civil war, and a curious saga of scattered bones.
https://loistavainfosecurity.com/bluetooth-ever-wonder-where-that-name-came-from/
Is available absolutely free . . .
Why make physical cybersecurity products?
The use of physical teaching tools is so "everywhere," it’s easy to overlook.
https://loistavainfosecurity.com/if-the-worlds-strongest-password/
Is available absolutely free . . .
Why make physical cybersecurity products?
The use of physical teaching tools is so "everywhere," it’s easy to overlook.
https://loistavainfosecurity.com/if-the-worlds-strongest-password/
Is available absolutely free
With one click of the mouse in a high-quality Password Manager.
1Password provides a list of various password styles, from least secure to most secure.
The winner?
https://loistavainfosecurity.com/the-worlds-strongest-password/
Is available absolutely free
With one click of the mouse in a high-quality Password Manager.
1Password provides a list of various password styles, from least secure to most secure.
The winner?
https://loistavainfosecurity.com/the-worlds-strongest-password/
Every one of us — hackers included — only have 24 hours in every day. How do hackers make the best use of their time when brute-forcing passwords?
What kinds of passwords do they avoid?
https://loistavainfosecurity.com/digital-garlic-scares-away-hackers/
Every one of us — hackers included — only have 24 hours in every day. How do hackers make the best use of their time when brute-forcing passwords?
What kinds of passwords do they avoid?
https://loistavainfosecurity.com/digital-garlic-scares-away-hackers/
Beyond simply being “rich,” what does it mean to possess Wealth?
Are you one of the "haves," or the "have nots"?
https://loistavainfosecurity.com/cybersecurity-is-a-form-of-wealth/
Beyond simply being “rich,” what does it mean to possess Wealth?
Are you one of the "haves," or the "have nots"?
https://loistavainfosecurity.com/cybersecurity-is-a-form-of-wealth/
by Andy Greenberg
What if the Blockchain isn't private? What if there was a secret flaw?
https://loistavainfosecurity.com/the-bitcoin-blockchain/
by Andy Greenberg
What if the Blockchain isn't private? What if there was a secret flaw?
https://loistavainfosecurity.com/the-bitcoin-blockchain/
Robert Herjavec of Shark Tank recommends storing your passwords in your browser.
Is this good advice to give to typical consumers?
https://loistavainfosecurity.com/store-passwords-in-your-browser/
Robert Herjavec of Shark Tank recommends storing your passwords in your browser.
Is this good advice to give to typical consumers?
https://loistavainfosecurity.com/store-passwords-in-your-browser/