top of page
![](https://static.wixstatic.com/media/9fc316_3fad98854f7a4933998e1481c1b3e1d0~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/9fc316_3fad98854f7a4933998e1481c1b3e1d0~mv2.webp)
![Online Security: Addressing the Dangers of Browser Extensions](https://static.wixstatic.com/media/9fc316_3fad98854f7a4933998e1481c1b3e1d0~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/9fc316_3fad98854f7a4933998e1481c1b3e1d0~mv2.webp)
John W Harmon PhD
Mar 1, 20244 min read
Online Security: Addressing the Dangers of Browser Extensions
Browser extensions have become as common as mobile apps. People tend to download many and use few. There are over 176,000 browser...
5 views0 comments
![Watch Out for Ransomware Pretending to Be a Windows Update](https://static.wixstatic.com/media/9fc316_5f8a712de0b4442e8f5751223ff62bd7~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/9fc316_5f8a712de0b4442e8f5751223ff62bd7~mv2.webp)
John W Harmon PhD
Nov 15, 20234 min read
Watch Out for Ransomware Pretending to Be a Windows Update
Imagine you’re working away on your PC and see a Windows update prompt. Instead of ignoring it, you take action. After all, you want to...
1 view0 comments
![What Is SaaS Ransomware - How Can You Defend Against It](https://static.wixstatic.com/media/9fc316_fd0312ed53194827bf36b2e86039a658~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/9fc316_fd0312ed53194827bf36b2e86039a658~mv2.webp)
John W Harmon PhD
Oct 31, 20233 min read
What Is SaaS Ransomware - How Can You Defend Against It
Software-as-a-Service (SaaS) has revolutionized the way businesses operate. It offers convenience, scalability, and efficiency. No more...
3 views0 comments
![](https://static.wixstatic.com/media/9fc316_8eba852457424b5f9b0796df7c3fb78c~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/9fc316_8eba852457424b5f9b0796df7c3fb78c~mv2.webp)
![That phishing site? Gone in 600 seconds](https://static.wixstatic.com/media/9fc316_8eba852457424b5f9b0796df7c3fb78c~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/9fc316_8eba852457424b5f9b0796df7c3fb78c~mv2.webp)
James Parsons
Oct 9, 20232 min read
That phishing site? Gone in 600 seconds
Did you know that a staggering 60% of phishing websites are only online for a fleeting 10 minutes? Yes, you read that right. Just ten...
2 views0 comments
![](https://static.wixstatic.com/media/9fc316_bcc493a31aff455c99dc61d2856fa29d~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/9fc316_bcc493a31aff455c99dc61d2856fa29d~mv2.webp)
![Beware these “too good to be true” Facebook ads](https://static.wixstatic.com/media/9fc316_bcc493a31aff455c99dc61d2856fa29d~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/9fc316_bcc493a31aff455c99dc61d2856fa29d~mv2.webp)
James Parsons
Sep 25, 20232 min read
Beware these “too good to be true” Facebook ads
We’ve all been there. You're scrolling through your Facebook feed, and an ad pops up promising to help you grow your business with some...
4 views0 comments
![](https://static.wixstatic.com/media/9fc316_ddc248e37548405aa6b07759e791becc~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/9fc316_ddc248e37548405aa6b07759e791becc~mv2.webp)
![Tempted to test new features before everyone else? DON’T BE!](https://static.wixstatic.com/media/9fc316_ddc248e37548405aa6b07759e791becc~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/9fc316_ddc248e37548405aa6b07759e791becc~mv2.webp)
James Parsons
Sep 18, 20232 min read
Tempted to test new features before everyone else? DON’T BE!
Ever been tempted to download the beta version of your favorite app, ready to test out all the cool new features before everyone else?...
1 view0 comments
![What is Zero-Click Malware? How Do You Fight It?](https://static.wixstatic.com/media/9fc316_67cc3201c2ac48988736622b7b1af76b~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/9fc316_67cc3201c2ac48988736622b7b1af76b~mv2.webp)
John W Harmon PhD
Aug 31, 20233 min read
What is Zero-Click Malware? How Do You Fight It?
In today's digital landscape, cybersecurity threats continue to evolve. They pose significant risks to individuals and organizations...
1 view0 comments
![](https://static.wixstatic.com/media/9fc316_7a0338238a1b4de99326cce2d5742e5a~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/9fc316_7a0338238a1b4de99326cce2d5742e5a~mv2.webp)
![Criminals are exploiting AI to create more convincing scams](https://static.wixstatic.com/media/9fc316_7a0338238a1b4de99326cce2d5742e5a~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/9fc316_7a0338238a1b4de99326cce2d5742e5a~mv2.webp)
James Parsons
Apr 17, 20232 min read
Criminals are exploiting AI to create more convincing scams
One of the many cool things about the new wave of Artificial Intelligence tools is their ability to sound convincingly human. AI chatbots...
6 views0 comments
![](https://static.wixstatic.com/media/9fc316_857913c0c08f479b93d1ef01ce34885c~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/9fc316_857913c0c08f479b93d1ef01ce34885c~mv2.webp)
![Windows is the prime target for cyber criminals](https://static.wixstatic.com/media/9fc316_857913c0c08f479b93d1ef01ce34885c~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/9fc316_857913c0c08f479b93d1ef01ce34885c~mv2.webp)
James Parsons
Dec 19, 20222 min read
Windows is the prime target for cyber criminals
With its huge dominance in the workplace, Microsoft’s Windows has become the prime target for cyber criminals. They’re looking to access...
19 views0 comments
bottom of page