Blog Posts

Here the CyberTech team works to create posts to keep you informed about good cybersecurity practices and what users of all age groups should be doing online.

I'm the creeper; catch me if you can!


October 2nd, 2023By: Clare Mccaffrey
Edited By: Anabel Otutu

Ethical Hacking Fundamentals: Exploring Information Gathering Techniques


September 28th, 2023 Author: Ryan Morrissey & Annabel Otutu

Tools for Defending Organizations with Advanced Threat Detection and Proactive Security Intelligence


September 21st, 2023 Author: Ryan Morrissey & Annabel Otutu

How does U.S. law protect us against illegal searches and seizures of our digital devices? 


June 23rd, 2023 Author: Alexia Bowie

What is it, how do attackers use it and how you can avoid becoming a victim 


June 5th, 2023 Author: Ryan Morrissey

Criminal targeting spyware gone wrong


May 18th 2023Author: Lily Pouliot

In a world of constant cyber-attacks, how can you secure your online life without memorizing hundreds of different passwords? 


April 27th, 2023Author: Matt Compton 

Computers mimicking human intelligence, what could go wrong? 


April 20th, 2023Author: David Thomsen

The mental toll victims endure after they are targeted online 


April 11th, 2023Author: Savannah Ciak 
March 23, 2023Author: Cameron Jalbert

When life gives you a pie, make a computer out of it! Celebrate International Pi Day by learning about the revolutionary tiny computers that changed the world of technology.


March 14, 2023Author: Savannah Ciak & Lily Pouliot

The Lack of Representation and How We Can Mitigate It


March 2, 2023Author: Savannah Ciak

Diving into the most advanced censorship program in the world.


February 22, 2023Author: Luke McKay

Who they are and what they have done.



February 16, 2023Author: Lily Pouliot

What is containerization and why should I use it?



February 8, 2023Author: Matt Compton

How one of gaming's biggest franchises became a victim.


January 25, 2023Author: Kevin Pozucek

Paying more to watch your cat videos. 


January 18, 2023Author: Hannelore Sanokklis

Scan a website for vulnerabilities from your phone.


June 24, 2022Author: Benji Gifford

A recent money hungry group that encrypts all your information unless a ransom is paid off.


May 24, 2022Author: Eric Burdick

Create, execute and use security tools all on your phone.


May 22, 2022Author: Benji Gifford

Logging is important to keep track of what is wrong with a system. However this does not leave loggers invulnerable to cyberattacks and exploits. 


April 21, 2022Author: Eric Burdick

Phones can be used to locate the nearest store or restaurant. But what if it can be used to locate people?


March 30, 2022Author: Eric Burdick

Ever lose your keys? Could you have sworn you left your bag there? By creating the AirTag, a device that has the intention to help you track down your misplaced items, Apple sought to get rid of this problem. But what if the person using it had more malicious purposes?


March 2, 2022Author: Eric Burdick

Do you usually trust the websites you browse to based on how they look? Facebook, Amazon, and Google - they all have a distinct look that you can recognize right away! What would happen if the link you clicked on led to a more malicious, yet familiar, site?


November  30, 2021Author: Eric Burdick

Looks like a thumb drive, types like a keyboard.


November 18, 2021Author: Miranda Pagarelski

While online shopping is convenient, easy, and accessible to most users, the dangers of online shopping may overweigh the benefits. Many people are at risk of having their personal and financial information stolen, so it is important to be aware of online vulnerabilities and know how to keep your private information secured. 


November 20, 2020Author: Henry Kenyon

With the COVID-19 pandemic closing many businesses' physical locations, many people are searching for places to work remotely. With only 26% of the United States' workforce working at physical job sites, many people have resorted to working remotely in public to separate their home and work environment. How can you work in public safely? Here’s what you should know. 


November 20, 2020Author: Emily Glazier

Technology continues to shift gears into the future and with these changes comes new technological advancements. The use of VoIP can allow users who do not have a cellular connection to make voice communications calls during Internet Protocols. 


November 20, 2020Author: Henry Kenyon



November 20, 2020Authors: Emily Glazier, Henry Kenyon

As technology advances, internet controlled devices begin to exist beyond just our smartphones and laptops, and are now everywhere, including in our homes through thermostats, door locks, baby monitors, and more. But, as technology increases, the security risks threatening your home increases as well. How safe are your smart home devices, and what can you do to protect your home? 



November 13, 2020Author: Emily Glazier, Henry Kenyon

While we have many positives of modern society online, there is a lot of negative activity that is going on in the background. People are having their information stolen while others are being harassed/stalked. There are many that also receive phishing attacks and while those are usually disguised. They are able to get many users to interact with them causing people to become victims of identity theft. Here is the latest on internet threats and what to do about them. 


November 13, 2020Author: Emily Glazier, Henry Kenyon
November 4, 2020Author: Emily Glazier, Henry Kenyon

As technology advances, it is important to know how to keep yourself safe while you’re managing social media pages online. It is also important to keep your personal information confidential. This blog post will cover some good tips on how to stay protected online.


October 28, 2020Authors: Emily Glazier, Henry Kenyon

Although any election faces challenges, the 2020 presidential election in the United States enters uncharted waters due to COVID-19 and national shutdown and restrictions around gatherings and settings where people can congregate, such as polling locations. Here’s what to know about COVID-19 and voting, and the cyberthreats surrounding the 2020 election. 


October 21, 2020Authors: Emily Glazier, Henry Kenyon

With the boom of social media platforms such as Instagram, TikTok, and Snapchat, more and more users worldwide give out their personal information to companies in order to use their platforms. But, how safe is your information in the hands of social media giants like Facebook, Youtube, and others? And, what’s going on with TikTok, and it’s owner: ByteDance


September 30, 2020Author: Emily Glazier

As classes and jobs begin to transition from classroom settings to virtual meetings with teachers and coworkers, it is important to be wary of the vulnerabilities that are connected to switching online.


September 23, 2020Author: Nurit Elber

In the new world of remote learning and remote work, it’s more important now than ever to keep your workstation secure! Utilize these tips for a safer workstation. 


April 16, 2020Author: Miranda Pagarelski

During these long weeks in quarantine, the government is working to pass the EARN IT bill, but what is the bill and how will it protect people working from home? 


April 15, 2020Author: Nurit Elber

Here are a few tips on how to troubleshoot connection issues. 


April 14, 2020Author: Miranda Pagarelski

With the internet becoming a more regular part of our lives, what are the ways we can protect our browsers?


April 14, 2020Author: Samuel Barrows

Zoom has become the hot topic in a lot of security news and regular news, but what is really going on? Why is it a big deal? 



Updated: April 8, 2020Author: Nurit Elber

How Do I Work Efficiently From Home? Due to the COVID-19 pandemic, many people are moving to remote work and remote learning. Here are a few tips to help with the transition! 



Updated: April 1, 2020Authors: Miranda Pagarelski, Nilesh Khetripal

What is a WiFi Pineapple and why should we as Internet users be aware of them? Here are some tips to make sure you aren't falling into a Man-in-the-Middle attack!


Updated: March 25, 2020Author: Nurit Elber