I had the pleasure of getting the story of how Michelle Pupoh, Senior Director of our Academy, made a massive career shift and landed where she is today. Here's what she shared: I trained to be a Marriage and Family Therapist. Eight years of learning about Freud,...
The Security of Christmas
As 2022 comes to a close and we slow down to be with family and friends, we at the Carolina Cyber Center want to take a moment and reflect on the true meaning of the season and the hope of a secure future for those who believe. For us, our ultimate security came...
Facing FFT: Fraudulent Funds Transfers
On the first Friday in December, we had a Lunch and Learn to talk about the basics and fundamentals of cybersecurity for small and medium-sized businesses. In a room full of these business leaders, one voiced their biggest fear: falling victim to a fraudulent...
Cybersecurity in the Workplace: 4 Tips to Keep Your Business Safe and Secure
Keeping information safe and secure has been a challenge for businesses of all sizes over the last few years. Shifts from in-person to online to hybrid workplaces forced companies to change, or at least reexamine, their cybersecurity practices and protocols, and far...
How do I Know What a Data Breach Looks Like?
Arguably no phrase has dominated the tech world the last 24 months more than the term “data breach.” From breaches that have impacted critical infrastructure like the Colonial Pipeline to hackers compromising healthcare records at UC San Diego Health, the last two...
Stay Cyber Secure in 4 Easy Steps
If you’ve ever felt overwhelmed with the amount of negative news around cybersecurity, you’re not the only one. Cybersecurity has become one of the biggest hot topics both inside and outside of technology circles over the last two years. From securing learning devices...
What CISA and ACSC’s 2021 Top Malware Strains Advisory Tells Us About Cybersecurity
The Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) worked together to create an advisory alerting the public to the top malware strains in 2021. Apart from including incredibly helpful summaries of each strain,...
Why We Should Communicate Cybersecurity Self-Efficacy
Our words matter. It’s an interesting statement for the cybersecurity profession, isn’t it? But it’s true. Technical skills are necessary, as are discipline, curiosity, and good character. And so are our words: they frame the context of our cybersecurity goals....
Aksoy’s Cisco and 5 Tips to Avoid a Scam
Not all cybersecurity dangers come from hackers. Some come from a man in Florida with fake Cisco network devices. Onur Aksoy, a.k.a. ‘Ron Aksoy’ or ‘Dave Durden,’ has been charged with importing fake networking devices from China and Hong Kong, selling them, according...
Celebrate Gartner’s Top Eight Predictions–Then Prepare
Gartner’s top eight predictions for the next four years double down on one specific thing: organizations will, and must, adapt to face growing cybersecurity threats. At the Gartner Security & Risk Management Summit in Australia last week, analysts outlined these...