Gene's Technical Field Notes
  • Home
  • Blog
  • About
5 Posts

data privacy

What Motivates Attackers to Come After You?
security data privacy

What Motivates Attackers to Come After You?

In order to strengthen the security for your organization you need to understand why attackers target you in the first place. There is an infinite combinati...

Gene Wright
Gene Wright 01 Nov 2022
Web Account Securtiy Hygene Tips
security data privacy

Web Account Securtiy Hygene Tips

As we prepare to close out this year and plan to start the year fresh, consider performing some security hygiene on your web-based accounts. Below are 7 acti...

Gene Wright
Gene Wright 01 Nov 2022
How to Protect Yourself From Credential Stuffing Attacks
security data privacy

How to Protect Yourself From Credential Stuffing Attacks

If you’ve heard it once you’ve heard it a million times, “don’t use the same passwords on multiple accounts.” But why? What’s the harm? This week we’re goin...

Gene Wright
Gene Wright 01 Nov 2022
Cybersecurity Laws Your Organization Has Already Broken
security data privacy

Cybersecurity Laws Your Organization Has Already Broken

We spend a lot of time talking about and focusing on protecting ourselves from outside threats but there could be several things that your business already d...

Gene Wright
Gene Wright 01 Nov 2022
Creating an Incident Response Plan
security data privacy

Creating an Incident Response Plan

The last couple of weeks we’ve talked about the cybersecurity threats that have been the most damaging this year and how to reduce your chances of becoming t...

Gene Wright
Gene Wright 01 Nov 2022
1 Posts

hardware

Raspberry Pi Configuration Notes
how-to rpi notes hardware

Raspberry Pi Configuration Notes

Create an Image for rpi use disk management to remove any partitions on the target sd card Format SD Card File Systeme Type: FAT32 All...

Gene Wright
Gene Wright 04 Nov 2022
1 Posts

how-to

Raspberry Pi Configuration Notes
how-to rpi notes hardware

Raspberry Pi Configuration Notes

Create an Image for rpi use disk management to remove any partitions on the target sd card Format SD Card File Systeme Type: FAT32 All...

Gene Wright
Gene Wright 04 Nov 2022
1 Posts

mfa

MFA is Not The Holy Grail of Security?
security mfa

MFA is Not The Holy Grail of Security?

While Multi Factor Authentication (MFA) does provide greater security than using passwords alone, it still is not perfect. The purpose of this article is not...

Gene Wright
Gene Wright 01 Nov 2022
1 Posts

notes

Raspberry Pi Configuration Notes
how-to rpi notes hardware

Raspberry Pi Configuration Notes

Create an Image for rpi use disk management to remove any partitions on the target sd card Format SD Card File Systeme Type: FAT32 All...

Gene Wright
Gene Wright 04 Nov 2022
1 Posts

rpi

Raspberry Pi Configuration Notes
how-to rpi notes hardware

Raspberry Pi Configuration Notes

Create an Image for rpi use disk management to remove any partitions on the target sd card Format SD Card File Systeme Type: FAT32 All...

Gene Wright
Gene Wright 04 Nov 2022
6 Posts

security

What Motivates Attackers to Come After You?
security data privacy

What Motivates Attackers to Come After You?

In order to strengthen the security for your organization you need to understand why attackers target you in the first place. There is an infinite combinati...

Gene Wright
Gene Wright 01 Nov 2022
Web Account Securtiy Hygene Tips
security data privacy

Web Account Securtiy Hygene Tips

As we prepare to close out this year and plan to start the year fresh, consider performing some security hygiene on your web-based accounts. Below are 7 acti...

Gene Wright
Gene Wright 01 Nov 2022
MFA is Not The Holy Grail of Security?
security mfa

MFA is Not The Holy Grail of Security?

While Multi Factor Authentication (MFA) does provide greater security than using passwords alone, it still is not perfect. The purpose of this article is not...

Gene Wright
Gene Wright 01 Nov 2022
How to Protect Yourself From Credential Stuffing Attacks
security data privacy

How to Protect Yourself From Credential Stuffing Attacks

If you’ve heard it once you’ve heard it a million times, “don’t use the same passwords on multiple accounts.” But why? What’s the harm? This week we’re goin...

Gene Wright
Gene Wright 01 Nov 2022
Cybersecurity Laws Your Organization Has Already Broken
security data privacy

Cybersecurity Laws Your Organization Has Already Broken

We spend a lot of time talking about and focusing on protecting ourselves from outside threats but there could be several things that your business already d...

Gene Wright
Gene Wright 01 Nov 2022
Creating an Incident Response Plan
security data privacy

Creating an Incident Response Plan

The last couple of weeks we’ve talked about the cybersecurity threats that have been the most damaging this year and how to reduce your chances of becoming t...

Gene Wright
Gene Wright 01 Nov 2022

Gene's Technical Field Notes

Don’t limit yourself. Many people limit themselves to what they think they can do. You can go as far as your mind lets you. What you believe, remember, you can achieve.

Recent posts

Raspberry Pi Configuration Notes
how-to rpi notes hardware

Raspberry Pi Configuration Notes

Gene Wright
Gene Wright 04 Nov 2022
What Motivates Attackers to Come After You?
security data privacy

What Motivates Attackers to Come After You?

Gene Wright
Gene Wright 01 Nov 2022

Menu

  • Home
  • About
2024 © Gene's Technical Field Notes.