trulight
consulting
BLOG
Unexpected
Cyber-attacks are becoming increasingly sophisticated and unpredictable, leaving businesses and individuals vulnerable to unexpected methods of attack. While most people are aware of common threats such as malware and phishing scams, there are other, less well-known...
Trulight Christian Character Scholarship
Trulight LLC made a commitment to give back to our community. One of the ways in which we do that is to award Chistian Character Scholarships to deserving students in Wakulla County. The Freshman $1000.00 Scholarship we offer is awarded to a current senior in...
Cyber In a Hurricane
As Hurricane Ian slams into southwest Florida, the people and industry in area will have a chaotic few weeks or months and in some cases years to clean up and recover from the physical damage of the storm. However, there are criminals that will take advantage of the...
First Cyber Hack
Pretend you are on Jeopardy – The year that the world’s first Cyber attack occurred. What is 1834, Alex? (My small tribute to Alex Trebek). 1834 is correct. In 1834, the Blanc brothers intercepted messages on the French telegraph (a mechanical line of sight system) to...
No such thing as Stress
While completing my Master’s degree a college professor made a bold statement to our class. He very directly said “There is no such thing as stress. Stress is a made up word. In order to combat it, you must call it what it is – Low-grade fear. If you recognize it for...
You are Unique
“You are unique, just like everybody else” is a quote that has a somewhat ambiguous origin. Some ascribe it to Jim Wright, others to Margaret Mead, however, it does have profound meaning when you use it as a lens to view yourself and your organization. You are unique,...
Active Cyber Defense
Active Cyber Defense NIST defines Active Cyber Defense as – Synchronized, real-time capability to discover, detect, analyze, and mitigate threats and vulnerabilities. In a nutshell, that means using strategies to actively predict, prevent, detect and combat cyber...
Sensible Cyber Security
Cyber Security on a budget Over 88% of businesses in the United States are considered small businesses and have less than 20 employees. These businesses often do not have a robust IT department or the technical expertise to put complex Cyber security protocols...
Open Source
Open Source I was giving a presentation a few months ago at a conference. The presentation was on “organization cyber security”. I touched on a few of the most common cyber security vulnerabilities and mentioned open-source software that gets downloaded onto...
Unknown Threat
While I was sitting in the CIO seat, I would be asked regularly about the latest cyber-attack. “Does thinking about the WannaCry virus keep you awake at night?” or “How do you sleep knowing the SolarWinds hack was successful?” My response was always the same. I...
Illuminating a Path