Select Page

Blog

Feedback on Cybersecurity

You are not who you say you are. But why?

I received a call from someone who was portraying as a representative from the major hotel chain where I stay for work and pleasure when I travel. I asked them to call me back at a later time as I was busy doing something at the time. Well, they did call back and then...

Smart Home Device and Spam Calls

Are the services interconnected? Or not? We went on a vacation for just under two weeks earlier this year. I enabled our smart home listening function which monitors for unusual sounds like smoke detectors, carbon monoxide alarms, etc. If it senses something, it...

Update: Back on Line

I devoted the past couple months to other personal and professional interests and essentially been silent on line. I’ve wanted to transform CyberZolutions’ business model to more of an information source anyway. So this seems like a good opportunity to do so. I’m...

Status

CyberZolutions has been silent over the summer. It doesn't mean it's gone. We'll be active in the near future.

Face ID and Password

My wife and I bought new IPhones this past week. We finally gave up on our IPhone 6 & 7s. We enabled the Face ID option, after some thought. Although I'm not exactly on board with how secure Face ID is, I do believe it's more secure than that pass code as someone...

New Business Content

I've been silent as of late, namely because I've been wanting to change my business strategy. While I'll still providing consulting services, I've decided to focus on delivering more on-line content. This change will be easier on my work/life balance since...

Controls: Part 2 – Firewalls

Firewalls are a great way to "control" the environment. They do play major part in protecting any sized business and the home as well: Firewalls are know for putting a barrier between the internet and your internal network. You can use applications to block specific...

Controls: Part 1

I’d like to discuss Media Protection (MP). Its title is self-explanatory, but it’s a vast topic. Protecting media is so important. If you’re a victim of crime and your computer is stolen. If your hard drive is encrypted, it’s data is probably useless to the person who...