top of page
Elizabeth Rasnick
May 8, 20232 min read
Day 8 - May 8 - A plea against using default passwords
This may sound obvious, but many, many people and organizations use default passwords on their networked devices. Please do not do this!...
0 views0 comments
Elizabeth Rasnick
May 7, 20232 min read
Day 7 - The online scam that almost got me
Online scams have been around almost from the first day the internet went public. Scammers get more clever everyday, constantly evolving...
0 views0 comments
Elizabeth Rasnick
May 6, 20232 min read
Day 6 - May 6 - Malware
The term malware is thrown around frequently, but most people don’t have a good handle on what exactly malware is. The word is actually a...
0 views0 comments
Elizabeth Rasnick
May 6, 20232 min read
Day 5 - May 5 - What color is your hat?
This question is critically important in cybersecurity. It indicates whether you are a good hacker, a bad hacker, or a dubious hacker....
2 views0 comments
Elizabeth Rasnick
May 4, 20232 min read
Day 4 - World Password Day
May the Force Be With You! Now that we have that behind us, it is also World Password Day. Why is this noteworthy, you may ask? It gives...
0 views0 comments
Elizabeth Rasnick
May 3, 20232 min read
Day 3 - CIA (not the agency)
A cornerstone in cybersecurity is the CIA triad. In cybersecurity CIA stands for Confidentiality, Integrity, and Availability. Here’s a...
0 views0 comments
Elizabeth Rasnick
May 2, 20232 min read
Day 2 - May 2 - The struggle to find the right balance between convenience and security
If we boil cybersecurity down to its essence, it comes to a balance between convenience for users of the systems and security of the...
0 views0 comments
Elizabeth Rasnick
May 1, 20232 min read
Welcome to my 100 Days of Cyber!
David Meece challenged me to do this and so here we go. (Thanks to David. This is a great dare to have been given and accepted.) Day 1 -...
3 views0 comments
bottom of page