OTA Blog

21 Jan16:38
21 Jan16:38
Jan 2021
Jan 2021
#

Scams Hiding In QR Codes

Should you be trusting of any random QR code that you find? I don’t think so....
07 Jan16:31
07 Jan16:31
#

Securing The Internet Of Things

It may seem harmless for a hacker to steal control of your refrigerator, but there are ways it can be valuable to them.....
17 Dec16:34
17 Dec16:34
Dec 2020
Dec 2020
#

Cloud Computing Services

“The cloud” has become a ubiquitous term but there are still a lot of people that don’t understand it....
03 Dec16:39
03 Dec16:39
#

Phishing Guts Part 2

It was designed to help “assist in the global control of ‘spam’ and ‘phishing’,” so failing this is a pretty significant flag.....
19 Nov17:14
19 Nov17:14
Nov 2020
Nov 2020
#

Cloud Infrastructure Overview

Although cloud infrastructure is often referred to as “the cloud”, it is not a singular entity....
05 Nov17:21
05 Nov17:21
#

Demystifying Blockchain

As it turns out, it's a pretty versatile technology that capitalizes on a lot of cyber security concepts to guarantee affordable, transparent, and secure transactions that cannot be altered...
29 Oct15:53
29 Oct15:53
Oct 2020
Oct 2020
#

Phishing Guts Part 1

The email subject was “Attn: Your 100$ Kohls Reward Has Arrived. 2HNZ”. This triggered my Spidey Senses....
01 Oct16:00
01 Oct16:00
#

Protecting Your Kids Online

While the internet can be a great tool for learning, it also has a dark side that parents should be aware of....
09 Sep17:20
09 Sep17:20
#

How to Protect Your Stored Data

People often have the misconception that their data is safe if it never leaves their system, but this is not true....
19 Aug17:04
19 Aug17:04
Aug 2020
Aug 2020
#

HTTPS, SSL, and TLS

Hyper Text Transfer Protocol Secure (HTTPS) is the solution to the security problem that plagued HTTP....
05 Aug16:37
05 Aug16:37
#

Safety in Online Gaming

Being a part of a gaming community is fun but like any community, there is going to be some people who spoil the bunch.....
29 Jul17:51
29 Jul17:51
Jul 2020
Jul 2020
#

Hardening Your Device’s Security

Unwanted software, unnecessary administrative privileges, application permissions, and chatty services are the norm for an improved User Experience. I am not a fan....
22 Jul15:53
22 Jul15:53
#

Traveling Safely With Technology

If your phone is confiscated or stolen, do you want all of your personal information in the hands of someone else? Not this guy!
01 Jul21:04
01 Jul21:04
#

Travel Safety

Do you want a foreign government or the thief who steals your wallet or purse to have pictures of your family, along with your drivers license that has your address? Not this guy!
24 Jun17:33
24 Jun17:33
Jun 2020
Jun 2020
#

Information Leakage on Social Media

Attackers know that social media profiles are treasure troves of personal information waiting to be harvested......
17 Jun21:10
17 Jun21:10
#

Home and Office Wi-Fi Security

...Initial router configurations are often set for convenience and not security, so it is recommended to take a moment to change some default settings.