Blog Posts
Photography

Budapest: Through the Lens

Budapest, the enchanting capital of Hungary, is a must-visit destination for travel photographers seeking to capture the perfect blend of historical charm and modern elegance. The city is often referred to as the “Pearl of the Danube” for its stunning architecture, picturesque riverfront, and vibrant culture. In this comprehensive guide, we’ll take you through the best photo locations in Budapest, including Saint Matthias Church, Fisherman’s Bastion, St. Stephen’s Basilica, and the Chain Bridge. Additionally, we’ll share essential photography tips and travel advice for US visitors to make your trip to Budapest an unforgettable experience. I have recently added a gallery for my Budapest images, and also intermixing some of those images throughout this article. I hope you enjoy them! Saint Matthias Church Located in the

Read More »
How Secure Is Your Phone? Image created with DALL-E of a hand holding a cellphone with a lock icon on the screen
Computing

Mobile Device Security – Tips and Tricks for General Users

Mobile Device Security – Tips and Tricks for General Users: a post in a series of articles for general endusers to better protect themselves online. In today’s world, our mobile devices have become an integral part of our daily lives. They store our personal information, allow us access to our finances and healthcare information, help us communicate, and provide entertainment. However, the convenience of these devices also makes them a prime target for cyber threats. In this blog post, we will cover the essential steps you need to take to secure your mobile device, regardless of your technical expertise. We will provide specific instructions for both iOS and Android platforms, as well as introduce the use of a password manager, such as 1Password, to help

Read More »
Encryption of local device to protect your data
Computing

Backup & Encrypt: Secure your Digital Life

In today’s world, safeguarding your personal data is more important than ever. Cyber threats and data loss are a growing concern, and taking the necessary steps to protect your valuable information is crucial. In this post, I will guide you through the process of encrypting your data using BitLocker for Windows devices and FileVault for Apple macOS devices. I will also discuss how to create a backup plan using iCloud, Dropbox, and Google Drive to ensure your critical data is protected. This is not meant to be a full technical writeup on these services, and there are dozens of other options; from other cloud backup solutions, to local external drives, to Network Attached Storage (NAS) solutions that may be recommended for niche use cases. This

Read More »
Identity Protection - Protecting yourself online
Computing

Online Identity – Protecting yourself from Theft

In this digital age, protecting your online identity is essential. Cyber criminals are constantly on the lookout for ways to hack into your accounts and steal your sensitive information. One of the best ways to enhance your cybersecurity is to use strong, unique passwords for each of your online accounts and enable two-factor authentication (2FA) wherever possible. There are a number of great tools available for the average user to help safeguard themselves. In this blog post, I will walk you through the process of managing your passwords using 1Password and setting up Two Factor Authentication (2FA) using Google Authenticator for popular platforms such as Gmail, Facebook, Instagram, and LinkedIn. Following these tips and expanding on them to the rest of your accounts will make

Read More »
Information Security - Tips and Tricks
Computing

Protecting yourself Online: A Beginner’s Guide for Information Security

In today’s digital age, information security is more important than ever. With cyber threats on the rise, it is crucial for everyday users to understand the basics of protecting their personal data. In this article, we will discuss key principles, strategies, and best practices to help you strengthen your online security. By the end of this post, you’ll have a better understanding of how to safeguard your digital assets and minimize your vulnerability to cyber threats. There are some things that you can’t control. Breaches of other people’s systems, unknown vulnerabilities in software you use, the phase of the moon – yes they are important, but you can’t control them directly – so focus on what you can impact! And in my experience the phase

Read More »
Ransomware terms tag cloud
Computing

Ransomware Detection & Response

Ransomware attacks have been on the rise in recent years, causing significant financial and operational disruptions for organizations across various sectors. This brief guide covers essential ransomware defense strategies, including understanding what ransomware is, implementing technology solutions and process controls, and preparing your organization to respond effectively to a ransomware attack. Ultimately, some of these recommendations are technical in nature, and you may need to enlist the help of a professional, but most of these can be implemented without expensive solutions and services. A little common sense, and skepticism, goes a long way. Note: A number of example products are listed here, but such listing should not be considered an endorsement, they are for illustrative purposes only. Background What is Ransomware? Ransomware is a type

Read More »
Risk Management by Nick Youngson CC BY-SA 3.0 Alpha Stock Images
Security

Risk Management or how high is that cliff?

Risk management is an indispensable element of cybersecurity for any organization. As the complexity and frequency of cyber threats continue to rise, implementing effective risk management practices becomes vital in protecting sensitive information, ensuring business continuity, and preserving an organization’s reputation. In this post, we will delve into the roles and responsibilities of various stakeholders involved in risk management and discuss best practices for successful risk mitigation. Keep in mind, “Risk Management” is a very broad topic covering multiple domains and disciplines. Herein we are specifically discussing its Cyber Risk aspect and methods. What is Risk Management? Within the realm of cybersecurity, risk management refers to the process of identifying, assessing, and prioritizing potential risks to an organization’s information systems. This also involves implementing suitable

Read More »
Online Gallery Shop - Open For Business
Photography

Online shop – Open for Business

I spent a few nights revamping the gallery and online shop that I host through SmugMug. If you like any of the photos, you can purchase prints on various materials, in virtually any size. Hell, you can even get puzzles and other things for some of the images … cheesy? Maybe 🤷🏼‍♂️. The prices are set for a modest profit, and if you really want something and can’t afford it, hit me up on my contact page and I will work with you. The object here is not to make a ton of money, but rather, to get some exposure and making a couple bucks on my art is worth it. I started to organize the shop into galleries for black and white, travel and

Read More »
Photography

London: Through the lens

As a photographer, visiting London feels like stepping into a treasure trove of iconic landmarks, historical architecture, and diverse cityscapes. Whether you’re a professional or an amateur, the city offers countless opportunities to capture stunning images that tell a unique story. In this blog post, I’ll explore some of the most photogenic locations in London, sharing tips and insights to help you make the most of your photography journey in this vibrant city. The London Eye The London Eye is one of the city’s most famous landmarks, attracting millions of visitors every year. The gigantic Ferris wheel, standing at 443 feet tall, offers breathtaking views of the city skyline, including the Houses of Parliament, Westminster Abbey, and the River Thames. The best time to photograph

Read More »