Author: Kenny Natiss

Cyber Hygiene: Simple Steps To Improve Personal Online Security

Kenny Natiss

We all protect our homes, family, jewelry, important paperwork, and most private processions. But how do we protect our digital life? These days, some of our most valuable assets exist fully online, so cyber security is critical for keeping our wealth and personal safety protected.

Kenny Natiss explores methods of cyber hygiene with these simple steps to improve one’s personal online security. 

Change Passwords Frequently and Use Different Logins

Passwords are the key to one’s personal accounts online. While it’s tempting to use something that is easy to remember, especially since they have to be entered so frequently, it’s much safer to use something highly complex and unique. And never use the same password for each login – that way, if one password is stolen, the thief can’t easily use the same email and password combination to access all of your other accounts.  

A password manager is the best way to track and generate complex and unique passwords. With it, the only password you will need to remember is the one to unlock the program itself.  

Use Two-Factor Authentication

Many websites and apps will prompt users to employ two-factor authentication. Whenever this option is available, be sure to opt-in. This means that in addition to entering your password, the site will also send a code to your email, phone, or an authenticator app that will have to be entered as well. It reduces the risks if someone is trying to break in – they would need to already have access to several of your devices and accounts in order to get past the multi-factor authentication process. 

Always Use Passcodes

Always use a passcode to secure a personal device, even when they are optional. There is a reason your iPhone keeps prompting you to set up a passcode, even long after it has already been set up. This is because many people have a vast amount of their private data stored on their phone, and phones are easily lost or stolen. Set up that 4-digit passcode and instantly decrease the risk of credit card or identity theft. 

Kenny Natiss

Use More than One Email Address

Just as using one password for everything can be tempting, so can relying on one personal email address to conduct all of an individual’s business online. This is rather unsafe. Consider setting up a few “dummy” email addresses to use at various stores or websites – there is also the option to switch over to a main email address later once the site feels more trustworthy. Not only does this protect your data, but it’s also a great way to reduce spam emails to your main account, since many stores will email offers multiple times a day.  

Don’t Click Untrustworthy Links

Nowadays we are constantly bombarded with phishing scams trying to steal our personal data. NEVER click a link in an email that looks suspicious. Even if it says it’s from a reputable website like Amazon or Netflix, check the email address in the “from” bar and you’ll likely see that it’s not actually “from” that URL at all. These businesses will never send you a link via text message to click and enter your password. This is phishing 101 – once you’ve given your email address and password to the scammers, you’ve opened yourself up to a myriad of problems. 

In Conclusion

Stay smart online to maintain cyber hygiene and improve your personal security by employing unique passwords, multi-factor authentication, device passcodes, and more. And never click those suspicious links! 

What is zero trust policy in the computer world according to Kenny Natiss

Zero Trust is a security concept in the computer world that requires all users to be authenticated before being granted access to apps and data, even if they were authenticated earlier. It is a strategic approach to cybersecurity that eliminates implicit trust and continuously validates every stage of a user’s access request.

The Zero Trust model assumes that individuals, devices, and services that are attempting to access company resources, even those inside the network, cannot automatically be trusted. This approach enhances security by verifying users every time they request access, regardless of their location or device.

Zero Trust differs from traditional security models in that it verifies a user’s identity each and every time they need specific system access, regardless of their location or device.

In contrast, traditional security models rely on a castle-and-moat cybersecurity model, in which anyone outside the corporate network perimeter is suspect and anyone inside gets the benefit of the doubt. The traditional model assumes that internal users are inherently trustworthy, known as implicit trust, which has resulted in many data breaches.  Zero Trust, on the other hand, eliminates implicit trust and continuously validates every stage of a user’s access request. While traditional security models focus on blocking, the Zero Trust model focuses on thorough and continuous verification.

According to Kenny Natiss the core principles of Zero Trust policy are based on the principle of least privilege, which permits access to various resources based on a strict set of standards to only allow authorized users. The Zero Trust model assumes that every user, device, and service that attempts to connect to a network is hostile until proven otherwise.. The fundamental principle of Zero Trust is to secure an organization’s data wherever it might live, while allowing only legitimate users and devices to access it. Zero Trust is designed to protect modern environments and enable fine-grained access control.  Security policy is applied based on context established through least-privileged access controls and strict verification. The Zero Trust model eliminates implicit trust and continuously validates every stage of a digital interaction.

What is Phishing and how to prevent it according to Kenny Natiss

Phishing is a type of cybercrime where an attacker poses as a trustworthy entity or person in electronic communication to obtain sensitive information such as login credentials, credit card information, and more. Attackers often use phishing emails to distribute malicious links or attachments that can extract personal information from victims.

To prevent phishing, it is important to never provide personal information in response to unsolicited requests. If you believe the contact may be legitimate, contact the financial institution or company directly to verify the request.

Additionally, it is recommended to use multi-factor authentication and to keep software up to date to protect against phishing attacks.

There are several common signs of a phishing email that can help you identify a potential attack. One of the most common indicators is a request for personal information.  Other signs include generic greetings or lack of greetings, misspellings, unofficial “from” addresses, and poor grammar and spelling.

Additionally, phishing emails may be sent from a public email domain or include suspicious attachments or links.  Unusually-worded subject lines can also be a sign of a phishing email.  It is important to be cautious when receiving emails from unknown senders and to verify the authenticity of any requests for personal information before providing any sensitive data.

How Cybersecurity Helps SaaS Companies Stay Ahead of Threats and Data Breeches

Kenny Natiss

With hackers becoming increasingly more sophisticated and determined, businesses that rely on software-as-a-service (SaaS) technologies must take extra steps to protect their customers and data. Though SaaS is often considered more secure than other types of software due to its cloud-based nature, there are still plenty of risks involved with the technology. 

Fortunately, by taking proactive steps to secure their SaaS environments and data, businesses can thrive in the modern digital landscape. Kenny Natiss explains below a few of the ways that cybersecurity can help SaaS companies stay ahead of cyber threats and protect their customers’ data:

Strong Authentication and Access Controls

One of the most important aspects of cybersecurity for SaaS companies is ensuring that only authorized users have access to sensitive data and systems. Whether this means requiring two-factor authentication for all user logins, implementing robust password policies and controls, or using other tools like biometrics and behavioral analytics, businesses can help safeguard their customers’ data by instituting strong authentication and access controls.

Encryption of Data at Rest and in Transit 

Another key element of cybersecurity for SaaS companies is the encryption of data both at rest – i.e., when it’s stored on a device or server – and in transit, i.e., when it’s being sent between devices and servers. With encryption, even if a hacker manages to gain unauthorized access to sensitive data or systems, they won’t be able to use or read the information.

Monitoring and Patching of Vulnerabilities 

In addition to securing user credentials and encrypting data, SaaS companies should implement robust monitoring and patching solutions to keep their systems and data safe from vulnerabilities. By identifying and addressing issues as soon as they arise, businesses can prevent hackers from exploiting software bugs or other weaknesses.

Regular Risk Assessments 

To stay ahead of cyber threats, SaaS companies must also perform regular risk assessments to identify potential vulnerabilities and assess their overall security posture. This allows businesses to proactively address any issues that arise and ensure that they are always one step ahead of hackers and cyber threats. Companies may wish to work with a third-party security expert to help conduct these assessments for added peace of mind.

Kenny Natiss

User Education and Awareness Training 

In addition to implementing the above cybersecurity best practices, businesses should also focus on educating their employees about cybersecurity risks and best practices. Whether this means providing regular training sessions or developing employee awareness materials, well-informed users can help improve data security for SaaS companies by being vigilant about suspicious activity and taking steps to prevent and report malicious or unauthorized activity.

Final Thoughts

Overall, by implementing these key cybersecurity practices and strategies, SaaS companies can stay ahead of cyber threats and protect their customers’ data from hackers and other malicious actors. With the stakes higher than ever before in today’s digital world, it is essential for businesses to take a proactive approach to secure their environments and data as much as possible.

Everything to Know About the Recent Twitter Hack & the Importance of Cybersecurity

Kenny Natiss

The recent Twitter hack has brought to light the importance of protecting our accounts and data from cybercriminals. In early January 2023, it was confirmed that a hacker managed to expose over 235 million email addresses connected to Twitter accounts, leaving users vulnerable to fraud and identity theft. 

This attack was not only limited to email addresses; it also included passwords, phone numbers, tweets and even direct messages. Kenny Natiss explains below the implications of this hack and how users can protect themselves with cybersecurity in the future. 

Behind the Hack

At the present time, the culprit is unknown. Early reports suggested that it was likely a group of hackers that managed to gain access to Twitter’s internal system, but no official statement or investigation results from Twitter have been released yet.

In addition to this, there are speculations that the hack could have taken place in early 2021, well before Elon Musk purchased the platform.


The implications of the recent hack are far-reaching, from exposing personal and confidential data to allowing scammers to send targeted phishing emails. 

Users can now expect to see an increase in spam emails and fraudulent messages sent through social media platforms as well as a higher risk of identity theft, as the exposed information can be used to access and take over accounts.

The hack has also raised concerns about how vulnerable Twitter is to cyberattacks, as well as the security of data stored on other social media platforms.

Protecting Yourself in the Future 

To protect yourself from similar attacks in the future, it’s important to be aware of the potential risks and take measures to protect your data. Here are a few tips to improve your online security:

·         Choose Strong Passwords

Although we hear it all the time, one of the most important steps is to create strong passwords for all of your accounts and make sure that they are unique. It’s also a good idea to change them regularly, especially after a major data breach like this one.

Kenny Natiss

·         Enable Two-Factor Authentication 

Two-factor authentication adds an extra layer of security by requiring users to check their phone or email for a code sent to them after entering their password, which they must them punch into the website they are attempting to log into. This means that even if a hacker manages to gain access to your account, they won’t be able to use it without the additional code.

·         Be Wary of Phishing Attacks 

Phishing attacks are emails that appear legitimate but are actually malicious and designed to steal information. Be wary of any emails that ask for sensitive information such as usernames, passwords, and financial details.

·         Stay Up to Date on Latest Security Threats 

Finally, it’s important to stay informed about the latest security threats so that you can be prepared in the event of a breach. Follow news outlet stories, social media posts, and information from cybersecurity organizations to keep up with the latest developments. 

Final Thoughts

By following these steps and taking measures to protect your data, you can help reduce the risk of becoming a victim of cybercrime. The recent Twitter hack has spotlighted the importance of online security and it is essential that we take precautions to protect our accounts and data.

The Difference Between IT Security and Cybersecurity

Kenny Natiss

At first glance, many people assume IT security and cybersecurity are the same, but that isn’t the case. While they both aim to protect people, data, and devices, they take vastly different approaches and consider distinct problems.

Kenny Natiss explains that in information technology (IT), professionals use computer networks, software, and hardware to share and store information. But cybersecurity focuses starkly on protecting digital devices, computer systems, and data from fraudulent access.

Those in either field will be responsible for protecting entities from electronic attacks that can result in data or identity theft, unauthorized access, malicious software, and more.

However, anyone looking to join either sector should be fully aware of the differences before deciding which path to take.

The 3 Major Differences Between IT Security and Cybersecurity

#1 Focuses and Subsets

Cybersecurity is all about protecting electronic information stored inside systems. It focuses on data and infrastructure, such as local area networks or internet connections that transmit and store information.

In other words, cybersecurity professionals prevent hackers from gaining virtual access to sensitive information on computers, networks, or programs. 

On the flip side, information technology focuses on the systems that hold the data that cybersecurity protects.

IT security is a subset of IT as a whole. Experts working in this discipline create plans to safeguard digital assets and monitor computer systems for threats. They also physically protect equipment from wrongdoings. 

But there is another subset of IT security — information security (InfoSec). Some information security professionals group this discipline into cybersecurity because some of the responsibilities overlap.

InfoSec focuses on preserving the security and integrity of data throughout transmission or storage. In essence, it encompasses all data forms, and experts employ a number of methods to protect it. 

#2 Approaches

The approaches taken by professionals in both files depend on the size of the organization. 

For instance, larger entities may employ IT and cybersecurity workers to perform security testing and educate executives on network or information threats.

However, smaller businesses typically focus cybersecurity efforts on defending their digital systems, asking specialists to take defensive and practice approaches. 

Kenny Natiss

#3 Techniques

Analysts working in information security tend to craft disaster recovery plans, offering organizations guidelines to follow to mitigate business downtime during emergencies. Such plans include:

  • Framework for maintaining and/or continuing IT operations following a natural or human-made disaster
  • Copying and storing data in the cloud
  • Actionable steps

On the other hand, cybersecurity techniques and responsibilities include verifying software updates, necessitating software updates, managing passwords, and using firewalls or anti-virus protection. 

Professionals in this field work tirelessly to design cybersecurity policies for businesses, such as enforcing two-factor authentication and limiting access. 

The Bottom Line

Knowing the differences between cybersecurity and IT security is a must for anybody looking to enter either field. 

That said, there are many overlapping goals, roles, and responsibilities. The disciplines just take different approaches and employ distinct techniques and strategies to achieve the same outcome — protection from human-made (i.e., hacking or scamming) and natural disasters. 

5 Ways Small Businesses Can Ramp Up Cybersecurity

Kenny Natiss

Cybercriminals don’t rest. They’re among the most prominent online threats and can instantly steal crucial data from companies. 

While businesses of all sizes have fallen victim to cybercrime, small businesses are usually at the top of their lists. They’re often the main targets of cyber-attacks because they don’t always have the resources that large corporations do. 

While they may be vulnerable, there are ways to protect themselves from cyber-attacks. Kenny Natiss discusses 5 ways small businesses can ramp up cybersecurity. 

Assess The Risks 

What’s the company most at risk for? When business owners understand their risks, they can take the right measures and address them. 

This is made possible through a cybersecurity risk assessment. Identifying the areas where the business is vulnerable allows companies to create a plan of action. This can include user training, tips on how to protect business data, ways to secure email platforms, and more.

Train Employees 

Investing in employee training is a simple way to ramp up cybersecurity efforts. Training employees not to click on a suspicious email will help prevent a data breach. 

Here’s what needs to be addressed during a cybersecurity employee seminar:

  • How to spot phishing emails
  • How to use good browsing practices
  • Creating strong passwords
  • How to maintain good cyber hygiene
  • How to protect sensitive company data

Extend These Measures To Smartphones 

Many companies conduct business through their mobile devices and many hackers target mobile devices, adding one more thing to the list of preventative measures. 

It is recommended to require employees to have password protected smartphones, install security applications, and encrypt their data. This will make it difficult for cyber criminals to steal important information while the smartphone is connected on public network. 

Remember that cyberattacks happen on vulnerable devices. Small businesses need to ensure all devices used to access customer information are protected using updated antivirus software.

Kenny Natiss

Make Sure Networks are Secure 

Perhaps the easiest way small businesses can ramp up cybersecurity is by securing their networks. They can do this by using a firewall and encrypting their data. 

All Wi-Fi networks or Service Set Identifiers (SSID) must be secure and hidden. This will prevent any non-employees from accessing the network. If they can access it, cyber criminals will to. 

5. Use Strong Passwords 

One of the most common ways that cybercriminals steal data from a company is by knowing their passwords. If a criminal can guess a password, the password is too weak. 

Unfortunately, passwords like “123456” and “password” continue to be utilized by many CEOs. This opens the door to cyber criminals ready to attack.

Tips to ensure a strong password include: 

  • Use at least one uppercase letter
  • Use at least one lowercase letter
  • Use at least one number
  • Use at least one special character
  • Make sure the password is 10 characters or longer

Final Thoughts

Keeping the five tips above will go a long way in protecting a small business. Business owners need to implement these measures to ramp up cybersecurity and keep the data of their employees, customers, and company safe.

Cybersecurity Considerations with Cryptocurrency

Kenny Natiss

Bitcoin and other cryptocurrencies often get used in scams, such as Ponzi schemes, phishing attacks, and fake ICOs. Crypto’s lack of regulation has led to several high-profile hacks, such as the Mt. Gox hack in 2014, resulting in the loss of over 650,000 bitcoins — a $460 million disaster. 

Unfortunately, these scams often look like legitimate investments, making them challenging to spot. Given the unique cybersecurity risks associated with cryptocurrency, Kenny Natiss says that companies should make sure they have a comprehensive cybersecurity plan in place.


Cryptocurrencies are digital or virtual tokens that use cryptography to secure their transactions and control the creation of new units. Since they are decentralized, neither the government nor financial institutions can manage them.

Bitcoin, the most well-known cryptocurrency, was created in 2009 in response to the global financial crisis. As of October 2022, there are over 19 million bitcoins in circulation, with a total market cap of around $368 billion.

In addition to being used to make purchases of goods and services, cryptocurrencies get exchanged frequently on decentralized exchanges. There are now thousands of different cryptocurrencies, including Ethereum, Litecoin, and Monero, with new ones made regularly, often referred to as altcoins or alternative coins.

The decentralized nature of cryptocurrency and its anonymity has made it a popular choice for investors, consumers, and, sadly, criminals.

Various Forms of Cryptocurrency Fraud That Compromise Cybersecurity

The most sophisticated type of fraud is the ransomware attack. Hackers encrypt a victim’s files and demand payment in cryptocurrency for the decryption key. The Colonial Pipeline attack was an example of this type of scam.

Kenny Natiss

Here are some of the most common cryptocurrency scams to be aware of:

·        Ponzi Schemes

This scam promises investors high returns for little to no risk. The people behind the scheme are simply using new investor money to pay off old investors. Eventually, the project will collapse, and many people will lose their money.

·        Fake ICOs

This scam involves creating a fake Initial Coin Offering (ICO) to raise funds from unsuspecting investors. The people behind the ICO often create a website and whitepaper that looks legitimate, but the project is nothing more than a fraud.

·        Phishing Attacks

In this scam, hackers attempting to steal login credentials or personal information send emails or other messages that seem to be from a reliable source. Be careful when clicking on unknown links within communication channels, as it could unwittingly give hackers access to individual accounts.

·        Malware

This scam involves installing malicious software on a computer that can steal personal information or login credentials. Be very careful when downloading files from the internet, as it could inadvertently install malware on an unsecured system.

·        Pump and Dump Schemes

This type of scam involves artificially inflating the price of a particular cryptocurrency through false and misleading statements. Once the price gets artificially inflated, the people behind the scheme sell their coins for a profit, leaving investors with worthless coins.

Safeguard Digital Assets With Cybersecurity

Cryptocurrency brings unique considerations to cybersecurity because no central authority can be held responsible for safeguarding assets. Instead, it is up to individual users to take measures to protect their investments.

By taking cybersecurity measures to protect assets and being aware of the risks, individuals and businesses can help safeguard their investments and personal information.

The Threat of Deepfakes in the Cybersecurity Sphere

The technology necessary to make deepfakes has been available since the mid-1990s. First seen in The Crow following the death of Brandon Lee, it was as realistic as the time allowed. So, why all the fuss now?

The main issue is the readily available technology. Before now, people needed specialist knowledge in high-tech, expensive CGI software to produce natural-looking people. But these days, deepfakes use AI, letting anyone with computer access make fake videos starring whoever they like.

They only need a few images or videos of the subject, and Kenny Natiss says a terribly realistic deepfake is formed. 

Kenny Natiss

The Rise of Deepfakes

Late 2017 saw the emergence of deepfakes. And while they may appear to be some clever technology developed by an intelligence agency, it was the creation of an unnamed Reddit user. That said, they didn’t invent it from thin air. It’s constructed on Google’s open-source TensorFlow learning library. 

Deepfakes use artificial intelligence to superimpose one face with a different one. How does it work? By evaluating movement positions and substituting replacements frame-by-frame to ensure the new face matches the original dimensions and conditions of the video.

In April 2018, Jordan Peele used deepfake technology to release a PSA starring Barack Obama. The video shows the former president saying various ridiculous things before discussing fake news. 

Not only does the video present a visual deepfake, but it also demonstrates audio faking! Peele used Adobe’s VoCo audio tool to create an overwhelmingly convincing output. 

Deepfakes: Are They Disinformation

Despite the somewhat-scary implications of deepfakes, they’re still (thankfully) far from perfect.

Of course, throughout deepfaked videos, they’ll look terrifyingly real at times, but the overall animation will contain minor glitches and imperfect matches, signposting itself as fake. 

Currently, the technology isn’t good enough to present disinformation. In fact, most deepfake enthusiasts have used it for making pornographic content — much to the relief of security professionals around the world. And even though some political videos have emerged, they’re too easily spotted to cause a problem.

Kenny Natiss

Evaluating the Risks of Deepfakes as Cybersecurity Threats

As the above-mentioned suggests, any untrained eye can spy a deepfake, meaning they aren’t a significant security threat. But technology is constantly improving. Presently, the greatest concern for deepfake technology is its use by state-paid actors who have the ability to craft ultra-convincing content.

The genuine threat begins when anybody with a computer can create the same level of deepfakes as those with plentiful resources!

Projections suggest these videos could be a national security problem, affecting everyone from businesses to end users. But thankfully, cybersecurity pros are already developing countermeasures. 

The Fake News Megaphone

At the end of the day, deepfakes don’t really present new problems. Instead, they potentially act as a megaphone for a current one — fake news.

Most of the population fails to establish whether a news source is credible. It’s this uncritical thinking that spurs the problem. Even near perfect deepfakes would be less of a threat if people weren’t so quick to accept anything they hear or read online.

The Future of Cybersecurity is Open Security

Kenny Natiss

The cybersecurity field is mired in secrecy. Security vendors tend to guard their threat detection and response protocols like the crown jewels, keeping them well and truly under wraps.

But Kenny Natiss says there are dire consequences to this level of secrecy. Black-box products, less-than-stellar integrations, and an overall lack of transparency are all symptoms of the detrimental subculture unwittingly created by cybersecurity professionals. Vendors continue prioritizing competition over collaboration, taking the industry further down the attacker-advantage path.

Something needs to change — and open security may well be the answer to providing better cyber safety for users, customers, and organizations. 

Open Security, Not Open Access

Closed security may be excellent for vendors in the short term. Still, leading Chief Information Security Officers say open security (i.e., widely available detection rules and open code and artifacts) is the way forward. 

Consider it a way of doing business — a methodology of sorts — that changes the archaic, secret way of conducting cybersecurity into a transparent, honest relationship with the company and its users.

The term “open” can incite fear in digital security professionals. However, this type of cyber protection isn’t about allowing access. Instead, it’s about encouraging across-the-board engagement to strengthen the security of users, customers, and vendors.

Crafting protection measures in the open landscape allows security professionals to see a product’s underlying code and test it before implementation. This doesn’t just save money; it deepens understanding of threat detection, security technology, and process simplification.

But perhaps most importantly, open security permits professionals to identify gaps or blind spots in a system’s code. It ensures companies can focus on removing holes in their security tech wall and develop risk profiles for emerging threats quicker. 

Kenny Natiss

Closing the Cyber Skills Gap

While the security silo-caused data breaches are dreadful, the constantly widening cyber skills gaps they create are just as terrible. Closed, proprietary security shuts doors in the faces of new-to-the-industry professionals. 

Security has shrouded itself in a cloak, reducing its talent pool’s diversity, deterring graduates, and encouraging hard-to-understand tools. New cyber protection employees struggle to break into the industry without the ability to play with on-the-market tools. 

Lowering the barrier to entry rests in the hands of open security. Accessible code encourages learning since they can develop a better understanding of how the technology works.

Transparency — The Key to Cybersecurity Maturity

The adage “security through obscurity” simply won’t cut it anymore. Cybersecurity professionals must break down their long-erected walls if they wish to achieve long-term protection. 

Over the past ten years, the industry has changed drastically — and now it’s time for the next phase. Implementing open security creates opportunities, unlocks education, and empowers users. 

Providers might be skeptical about opening security’s black box due to the ever-present questionable codes and bypasses within the industry. But forward-thinking professionals understand that open security can start righting this wrong. After all, it’s only a matter of time before consumers begin demanding transparency, forcing vendors to oblige. 

In a phrase, open security is the future of cybersecurity.