Categories
Cyber Security TECH & CYBERSECURITY

The 8 Phases of Cyber Security Testing

Unlike the previous post: The 5 Phases Of Hacking. This procedure mostly resonates with cybersecurity professionals and/or ethical hackers. 1. SCOPING Determining the rules of engagement for the assessment. 2. Reconnaissance Also known as Information Gathering. Gather Relevant information and enumerate the attack surface. 3. Vulnerability Assessment Also known as Scanning and Enumeration. Identify vulnerabilities […]

Categories
Anonymity TECH & CYBERSECURITY

10 Anonymity Rules

Use Tor (Encrypted Browser, Proxy and Protocol). Use Tails (Secure OS). Use Signal (Secure Messaging App). Use Burner Emails. Use a VPN (A Non Logging and Non 14 Eyes Virtual Private Network). Don’t Log In Unnecessarily. Use Private Browsing Modes. Use Duck Duck Go (Secure Search Engine with a Strict No Following Rule). Disable Telemetry […]

Categories
Data Security TECH & CYBERSECURITY

10 Internet Safety Rules

Keep Personal Information Professional and Limited Keep Your Privacy Settings On Practice Safe Browsing Use a Secure VPN Connection Be Careful What You Download and Where You Download From Choose Strong Passwords and Enable 2 Factor Authentication Make Online Purchases From Secure and Trusted Sites Be Careful What You Post Be Careful Who You Meet […]