Penny Hoelscher

Penny Hoelscher has a degree in journalism and a background in legacy programming. But, with an aversion to danger and conflict, she now combines interests in writing and IT safely from behind her computer screen.

What is the best WPA2 security mode: AES, TKIP, or both?
By in Information Security, on September 13, 2018 at 2:40 pm
What is the best WPA2 security mode: AES, TKIP, or both?

In this article, we will explain what AES and TKIP are and suggest which option you should choose for your WPA2-supported devices

What is WPA3, is it secure and should I use it?
By in Information Security, on August 27, 2018 at 2:16 pm
What is WPA3, is it secure and should I use it?

Is WPA3 secure? This is the latest burning question in wifi security after a serious vulnerability was found in Wifi Protected Access 2 (WPA2), the security standard used by most wifi networks. WPA3 improves upon its predecessor and is now the recommended standard to protect wifi.

Cyber security and remote working: What are the risks and how can you mitigate them?
By in Information Security, on August 7, 2018 at 5:53 pm
Cyber security and remote working: What are the risks and how can you mitigate them?

The issue of security and remote working can be a headache for digital workers and their employers. Here we investigate risks and solutions.

How to securely erase external hard drives, SD cards, or flash drives
By in Information Security, on June 21, 2018 at 1:01 pm
How to securely erase external hard drives, SD cards, or flash drives

Learn how to securely erase external storage devices, like SD cards, USB sticks, or flash drives using apps for various operating systems.

5 courses to learn ethical hacking online
By in Information Security, on June 11, 2018 at 7:44 am
5 courses to learn ethical hacking online

Jumpstart your cybersecurity career with an online ethical hacking course. Ethical hacking is the process of attempting to penetrate computer systems and networks with the intention of locating weaknesses and vulnerabilities (real and potential) that could be exploited by malicious hackers.

How to encrypt files and folders in Windows 10, 8 or 7
By in VPN & Privacy, on June 5, 2018 at 11:51 am
How to encrypt files and folders in Windows 10, 8 or 7

If you encrypt files and folders in Windows, your data will become unreadable to unauthorized parties. Only someone with the correct password, or decryption key, can make the data readable again. This article will explain several methods Windows users can utilize to encrypt their devices and the data stored on them.

20 of the most interesting companies to visit at Infosec Europe 2018
By in Information Security, on May 23, 2018 at 5:39 pm
20 of the most interesting companies to visit at Infosec Europe 2018

Here we give you the lowdown on the most interesting companies at Infosec Europe 2018. Infosecurity Europe (Infosec) is the region’s most exciting information security event, featuring a broad range of conference programs, scores of exhibitors (400+) and inspiring speakers, and thousands (19,500+) of cybersecurity professionals, IT movers and shakers, entrepreneurs, and influencers from around […]

13+ free pentesting tools
By in Information Security, on May 15, 2018 at 11:02 am
13+ free pentesting tools

Free pentesting tools are staples in an ethical hacker’s toolkit. Here we showcase the best and most popular open-source ones on the internet. We have also found some useful pentesting tutorials to get you started, and some challenging online exercises to practice your ethical hacking skills.

30+ free tools to improve security for your website and your visitors
By in Information Security, on December 20, 2017 at 12:37 pm
30+ free tools to improve security for your website and your visitors

Cyberattacks are a daily occurrence and the concomitant costs for organizations are escalating. However, you can mitigate cyber disaster with free website security tools that will help you to identify website vulnerabilities and keep your visitors safe, or rather … safer.  One would think large enterprises have the means and opportunity to monitor their applications […]

BYOD security: What are the risks and how can they be mitigated?
By in Information Security, on November 5, 2017 at 2:28 pm
BYOD security: What are the risks and how can they be mitigated?

BYOD, and remote devices in general, carry a risk of data loss and data leakage. Here are some pointers on formulating a strategy to mitigate those risks.