
Welcome to your new site.
Start by updating the cover image or adding some new content.
“We live in a society exquisitely dependent on science and technology, in which hardly anyone knows anything about science and technology.” –
Carl Sagan
“If we knew what it was we were doing, it would not be called research, would it?” – Albert Einstein
“In questions of science, the authority of a thousand is not worth the humble reasoning of a single individual.” – Galileo Galilei
Galileo Galilei


There are three well-known types of hackers in the world of information security: black hats, white hats and grey hats. These colored hat descriptions were born as hackers tried to differentiate themselves and separate the good hackers from the bad. The roots of the black and white hat labels are drawn from Western movies, where protagonists wore white hats and antagonists wore black hats.
There are three well-known types of hackers in the world of information security: black hats, white hats and grey hats. These colored hat descriptions were born as hackers tried to differentiate themselves and separate the good hackers from the bad. The roots of the black and white hat labels are drawn from Western movies, where protagonists wore white hats and antagonists wore black hats.
Step to recover from cyber attack
1. Determine what was lost
“The first step you should do after a cyber attack is the most important, and also by far the most overlooked. Sometimes it is pure laziness and other times companies don’t want to face reality, but if you are the subject of a cyber attack you need to determine exactly what information was stolen. The reason for this is because the information stolen directly determines what your next step is.
I Think of it as one of those spider charts you see on a detective’s wall when they’re trying to pin down a murder. They’re trying to make a connection with lines and pictures of people. You need to make a similar chart after a cyber attack. You start with whatever was stolen and then make connections and steps from that information. If email addresses were stolen, your flow chart of next steps is going to look extraordinarily different than if social security numbers were stolen.”
2. Replace the old with the new
“In the first 3-4 months after a previous company I worked for experienced a cyber attack, we replaced every piece of security technology with new technology and added tools where it was needed to create defense in depth. We concentrated on making the solutions highly integrated, creating wide-ranging viability and alerting, and took advantage of automation. We consciously balanced preventive tools with detective capabilities instead of one or the other.
In my experience, even if you buy all the shiny new technology, but it’s useless without solid processes and controls in both ITand the business. Data breaches and attacks, regardless of if they are from the inside or outside, hinge on the behavior of people. No technology can stop a motivated person with enough time and resources. It can prevent the majority but not plurality.”
3. Stop everything to find the virus
“One of my previous employers experienced a cyber attack and they sprang into action right away. The course of action was to find the virus that someone had downloaded from a phishingemail. Every computer was scanned and the internet was shut off all week to ensure the virus didn’t spread or any other malicious emails were sent.
The following week, they were able to get all the computers cleaned so the internet was turned back on. Following the attack, precautions were taken so that no outside emails were allowed in the company’s Outlook email server. If any were to come through they would immediately be blocked. The company then made sure to conduct phishing training with mock scams sent to people to teach them not to open unauthorized messages.”
4. Invest in proper software
“Preparing for an attack starts with assuming an employee will introduce malware into the network and taking steps to prevent its spread when that happens. It’s incredibly hard to prevent employees from making mistakes, which is why organizations need security technologies that prevent ransomware and spyware from spreading once the inevitable happens.”
5. Make the most of your backups
“A few years ago, I fought off a ransomware attack. An email came in to my customer’s employee, claiming to come from a trusted source. The employee opened the attachment and unwittingly launched a malicious program that scrambled many of the organization’s files.
This happens to people every day and the recovery process doesn’t have to be anything heroic. In this case, I recovered all my customer’s scrambled files from the previous day’s backups and life went on. Thankfully, they only lost one day of productivity, and so what could have been a disaster turned into an inconvenience. We had a long talk with the employee about the dangers of opening email attachments after that, and reminded everyone else to be careful.”

There are lots of ways to protect your personal information and data from scammers. But what happens if your email or social media account gets hacked? Here are some quick steps to help you recover your email or social media account.
Signs That Your Email or Social Media Account Has Been Hacked
You might have been hacked if
- your social media account has posts you didn’t make
- you can’t log into your email or social media account
- your Sent folder has messages you didn’t send, or has been emptied
- friends and family are getting emails or messages you didn’t send, sometimes with random links