Penny Hoelscher

Penny Hoelscher has a degree in journalism and a background in legacy programming. But, with an aversion to danger and conflict, she now combines interests in writing and IT safely from behind her computer screen.

How to securely erase external hard drives, SD cards, or flash drives
By in Information Security, on June 21, 2018 at 1:01 pm
How to securely erase external hard drives, SD cards, or flash drives

Learn how to securely erase external storage devices, like SD cards, USB sticks, or flash drives using apps for various operating systems.

5 courses to learn ethical hacking online
By in Information Security, on June 11, 2018 at 7:44 am
5 courses to learn ethical hacking online

Jumpstart your cybersecurity career with an online ethical hacking course. Ethical hacking is the process of attempting to penetrate computer systems and networks with the intention of locating weaknesses and vulnerabilities (real and potential) that could be exploited by malicious hackers.

How to encrypt files and folders in Windows 10, 8 or 7
By in VPN & Privacy, on June 5, 2018 at 11:51 am
How to encrypt files and folders in Windows 10, 8 or 7

If you encrypt files and folders in Windows, your data will become unreadable to unauthorized parties. Only someone with the correct password, or decryption key, can make the data readable again. This article will explain several methods Windows users can utilize to encrypt their devices and the data stored on them.

20 of the most interesting companies to visit at Infosec Europe 2018
By in Information Security, on May 23, 2018 at 5:39 pm
20 of the most interesting companies to visit at Infosec Europe 2018

Here we give you the lowdown on the most interesting companies at Infosec Europe 2018. Infosecurity Europe (Infosec) is the region’s most exciting information security event, featuring a broad range of conference programs, scores of exhibitors (400+) and inspiring speakers, and thousands (19,500+) of cybersecurity professionals, IT movers and shakers, entrepreneurs, and influencers from around […]

13+ free pentesting tools
By in Information Security, on May 15, 2018 at 11:02 am
13+ free pentesting tools

Free pentesting tools are staples in an ethical hacker’s toolkit. Here we showcase the best and most popular open-source ones on the internet. We have also found some useful pentesting tutorials to get you started, and some challenging online exercises to practice your ethical hacking skills.

30+ free tools to improve security for your website and your visitors
By in Information Security, on December 20, 2017 at 12:37 pm
30+ free tools to improve security for your website and your visitors

Cyberattacks are a daily occurrence and the concomitant costs for organizations are escalating. However, you can mitigate cyber disaster with free website security tools that will help you to identify website vulnerabilities and keep your visitors safe, or rather … safer.  One would think large enterprises have the means and opportunity to monitor their applications […]

BYOD security: What are the risks and how can they be mitigated?
By in Information Security, on November 5, 2017 at 2:28 pm
BYOD security: What are the risks and how can they be mitigated?

BYOD, and remote devices in general, carry a risk of data loss and data leakage. Here are some pointers on formulating a strategy to mitigate those risks.