Recent Updates
  • I'd consider the website a work in progress still, but more content is up including the new version of a module that was previously posted. I wrote a blog post about the pivot from B2C to B2B at https://infoonity.com/blog/06-2024/pivot-explanation.html, but I'll copy and paste the text here for convenience.

    Pivot Explanation

    Infoonity is pivoting from a B2C to B2B business model.

    In the past, Infoonity had a B2C (business to consumer) business model, for example by having books for sale on Amazon. However, it was decided that more impact could be made by having an open content business model, with revenue coming in the form of consulting and premium support for organizations that want it. This business model was inspired by Red Hat's business model of offering open source programs while making some money through consulting.

    This has led to some of the B2C content being made free and put under the Creative Commons CC0 license. So, in the context of the USA, this means that the CC0 licensed content is in the public domain. This is good since small businesses, such as some vendors of larger organizations, can get some free information security awareness content, and if other organizations pay for some more customized information security awareness content, the licensing for sharing that content with their vendors can be made easier. Additionally, while some of the content is available on some social media platforms, some companies may have bans on those websites. So if a website like Youtube is banned for example in a company, that same company could allow https://Infoonity.com and the videos on the website to be unblocked so that employees could enjoy some information security awareness content relevant to their jobs.

    So, hopefully you enjoy the pivot and the content. Please feel free to share the CC0 content, such as some of the videos and readings, if you find those useful. If you're part of an organization that wants some more customized content, such as curated role-based content, feel free tocontact Infoonity for consultation. You can help others while helping your organization's cyberinsurability posture.
    I'd consider the website a work in progress still, but more content is up including the new version of a module that was previously posted. I wrote a blog post about the pivot from B2C to B2B at https://infoonity.com/blog/06-2024/pivot-explanation.html, but I'll copy and paste the text here for convenience. Pivot Explanation Infoonity is pivoting from a B2C to B2B business model. In the past, Infoonity had a B2C (business to consumer) business model, for example by having books for sale on Amazon. However, it was decided that more impact could be made by having an open content business model, with revenue coming in the form of consulting and premium support for organizations that want it. This business model was inspired by Red Hat's business model of offering open source programs while making some money through consulting. This has led to some of the B2C content being made free and put under the Creative Commons CC0 license. So, in the context of the USA, this means that the CC0 licensed content is in the public domain. This is good since small businesses, such as some vendors of larger organizations, can get some free information security awareness content, and if other organizations pay for some more customized information security awareness content, the licensing for sharing that content with their vendors can be made easier. Additionally, while some of the content is available on some social media platforms, some companies may have bans on those websites. So if a website like Youtube is banned for example in a company, that same company could allow https://Infoonity.com and the videos on the website to be unblocked so that employees could enjoy some information security awareness content relevant to their jobs. So, hopefully you enjoy the pivot and the content. Please feel free to share the CC0 content, such as some of the videos and readings, if you find those useful. If you're part of an organization that wants some more customized content, such as curated role-based content, feel free tocontact Infoonity for consultation. You can help others while helping your organization's cyberinsurability posture.
    0 Comments 1 Shares 2K Views
  • It's important to make sure your software is up to date. Otherwise it could be easier for hackers to get in to your programs. #cybersecurity #tech #cybersecurityawareness #cybersecuritytips #technology #informationsecurity #informationsecurityawareness
    It's important to make sure your software is up to date. Otherwise it could be easier for hackers to get in to your programs. #cybersecurity #tech #cybersecurityawareness #cybersecuritytips #technology #informationsecurity #informationsecurityawareness
    0 Comments 0 Shares 6K Views 1
  • If you had a dollar for every fake Netflix account hold text you got, what would you buy? It's important not to actually click on the links in these scam texts, which could lead to installing viruses or being brought to a fake site which tries to take your login information. #scam #scams #informationsecurity #cybersecurity
    If you had a dollar for every fake Netflix account hold text you got, what would you buy? It's important not to actually click on the links in these scam texts, which could lead to installing viruses or being brought to a fake site which tries to take your login information. #scam #scams #informationsecurity #cybersecurity
    Haha
    1
    2 Comments 1 Shares 6K Views 1
  • Well this is a new way to possibly try to get me to reply to a possible scam. I have a feeling that if I reply, I’ll get a response like, “Oh sorry, well let’s get to know each other. By the way I know this fantastic crypto investment…” I don’t know this number, nor do I know anyone from the area code it was sent from. #informationsecurity #cybersecurity #scam
    Well this is a new way to possibly try to get me to reply to a possible scam. I have a feeling that if I reply, I’ll get a response like, “Oh sorry, well let’s get to know each other. By the way I know this fantastic crypto investment…” I don’t know this number, nor do I know anyone from the area code it was sent from. #informationsecurity #cybersecurity #scam
    Haha
    1
    0 Comments 0 Shares 4K Views
  • I’m back from vacation. :) I plan to make some kind of content in the future about posting about vacations on social media after returning from vacation, rather than during or before. #informationsecurity #informationsecurityawareness
    I’m back from vacation. :) I plan to make some kind of content in the future about posting about vacations on social media after returning from vacation, rather than during or before. #informationsecurity #informationsecurityawareness
    Like
    1
    1 Comments 0 Shares 3K Views
  • Hmmm, I’m not sure why the last video didn’t upload correctly. I plan to try uploading it sometime later.
    Hmmm, I’m not sure why the last video didn’t upload correctly. I plan to try uploading it sometime later.
    Like
    1
    0 Comments 0 Shares 1K Views
  • At the moment, the fingerprint scanner is my favorite for MFA when paired with my password manager on my MacOS. #informationsecurity #cybersecurity #tech #technology #mfa #iam #gadget #apple #magickeyboard #2fa #infosec
    At the moment, the fingerprint scanner is my favorite for MFA when paired with my password manager on my MacOS. #informationsecurity #cybersecurity #tech #technology #mfa #iam #gadget #apple #magickeyboard #2fa #infosec
    Like
    1
    0 Comments 0 Shares 5K Views 1
  • Smartphone Privacy Screen Awareness

    This is a short video to make you aware of the existence of privacy screens for smartphones basically. This is an iPhone, but some other smartphones have privacy screens available as well. The one I have on my iPhone in this video is from 3M.

    #informationsecurity #informationsecurityawareness #privacy #privacyscreenprotector #privacyscreen #tech #technology #smartphone #3M #privacymatters
    Smartphone Privacy Screen Awareness This is a short video to make you aware of the existence of privacy screens for smartphones basically. This is an iPhone, but some other smartphones have privacy screens available as well. The one I have on my iPhone in this video is from 3M. #informationsecurity #informationsecurityawareness #privacy #privacyscreenprotector #privacyscreen #tech #technology #smartphone #3M #privacymatters
    Like
    1
    2 Comments 0 Shares 4K Views 0
  • This video introduces the YubiKey (https://www.yubico.com/products/), which reportedly for a time seemed to eliminate account takeovers through phishing at work, and this still may be the case. "

    Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes, the company told KrebsOnSecurity." (Source: https://krebsonsecurity.com/2018/07/google-security-keys-neutralized-employee-phishing/). I've been using some YubiKeys, and I recommend trying these out at least.

    #informationsecurity #cybersecurity #yubikey #informationsecurityawareness #cybersecurityawareness #fips #tech #technology #IAM #identityaccessmanagement #hardware #gadget #gadgets #Yubico
    This video introduces the YubiKey (https://www.yubico.com/products/), which reportedly for a time seemed to eliminate account takeovers through phishing at work, and this still may be the case. " Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes, the company told KrebsOnSecurity." (Source: https://krebsonsecurity.com/2018/07/google-security-keys-neutralized-employee-phishing/). I've been using some YubiKeys, and I recommend trying these out at least. #informationsecurity #cybersecurity #yubikey #informationsecurityawareness #cybersecurityawareness #fips #tech #technology #IAM #identityaccessmanagement #hardware #gadget #gadgets #Yubico
    Like
    1
    0 Comments 0 Shares 7K Views 0
  • This is about a flash drive called the Aegis Secure Key (https://apricorn.com/flash-keys/) that can be used to keep confidential files more secure than otherwise. For example, even if the flash drive is stolen, it can be difficult for someone to guess the pin combination.

    If you liked this video, please share it.

    #cybersecurity #cybersecurityawareness #informationsecurity #informationsecurityawareness #tech #technology #usb #flashdrive
    This is about a flash drive called the Aegis Secure Key (https://apricorn.com/flash-keys/) that can be used to keep confidential files more secure than otherwise. For example, even if the flash drive is stolen, it can be difficult for someone to guess the pin combination. If you liked this video, please share it. #cybersecurity #cybersecurityawareness #informationsecurity #informationsecurityawareness #tech #technology #usb #flashdrive
    Like
    1
    0 Comments 0 Shares 4K Views 2
More Stories