Infoonity creates information security awareness content.
-
Gab Profile
https://gab.com/infoonity
Atualizações recentes
-
I'd consider the website a work in progress still, but more content is up including the new version of a module that was previously posted. I wrote a blog post about the pivot from B2C to B2B at https://infoonity.com/blog/06-2024/pivot-explanation.html, but I'll copy and paste the text here for convenience.
Pivot Explanation
Infoonity is pivoting from a B2C to B2B business model.
In the past, Infoonity had a B2C (business to consumer) business model, for example by having books for sale on Amazon. However, it was decided that more impact could be made by having an open content business model, with revenue coming in the form of consulting and premium support for organizations that want it. This business model was inspired by Red Hat's business model of offering open source programs while making some money through consulting.
This has led to some of the B2C content being made free and put under the Creative Commons CC0 license. So, in the context of the USA, this means that the CC0 licensed content is in the public domain. This is good since small businesses, such as some vendors of larger organizations, can get some free information security awareness content, and if other organizations pay for some more customized information security awareness content, the licensing for sharing that content with their vendors can be made easier. Additionally, while some of the content is available on some social media platforms, some companies may have bans on those websites. So if a website like Youtube is banned for example in a company, that same company could allow https://Infoonity.com and the videos on the website to be unblocked so that employees could enjoy some information security awareness content relevant to their jobs.
So, hopefully you enjoy the pivot and the content. Please feel free to share the CC0 content, such as some of the videos and readings, if you find those useful. If you're part of an organization that wants some more customized content, such as curated role-based content, feel free tocontact Infoonity for consultation. You can help others while helping your organization's cyberinsurability posture.I'd consider the website a work in progress still, but more content is up including the new version of a module that was previously posted. I wrote a blog post about the pivot from B2C to B2B at https://infoonity.com/blog/06-2024/pivot-explanation.html, but I'll copy and paste the text here for convenience. Pivot Explanation Infoonity is pivoting from a B2C to B2B business model. In the past, Infoonity had a B2C (business to consumer) business model, for example by having books for sale on Amazon. However, it was decided that more impact could be made by having an open content business model, with revenue coming in the form of consulting and premium support for organizations that want it. This business model was inspired by Red Hat's business model of offering open source programs while making some money through consulting. This has led to some of the B2C content being made free and put under the Creative Commons CC0 license. So, in the context of the USA, this means that the CC0 licensed content is in the public domain. This is good since small businesses, such as some vendors of larger organizations, can get some free information security awareness content, and if other organizations pay for some more customized information security awareness content, the licensing for sharing that content with their vendors can be made easier. Additionally, while some of the content is available on some social media platforms, some companies may have bans on those websites. So if a website like Youtube is banned for example in a company, that same company could allow https://Infoonity.com and the videos on the website to be unblocked so that employees could enjoy some information security awareness content relevant to their jobs. So, hopefully you enjoy the pivot and the content. Please feel free to share the CC0 content, such as some of the videos and readings, if you find those useful. If you're part of an organization that wants some more customized content, such as curated role-based content, feel free tocontact Infoonity for consultation. You can help others while helping your organization's cyberinsurability posture.0 Comentários 1 Compartilhamentos 2KB VisualizaçõesFaça o login para curtir, compartilhar e comentar! -
It's important to make sure your software is up to date. Otherwise it could be easier for hackers to get in to your programs. #cybersecurity #tech #cybersecurityawareness #cybersecuritytips #technology #informationsecurity #informationsecurityawarenessIt's important to make sure your software is up to date. Otherwise it could be easier for hackers to get in to your programs. #cybersecurity #tech #cybersecurityawareness #cybersecuritytips #technology #informationsecurity #informationsecurityawareness0 Comentários 0 Compartilhamentos 6KB Visualizações 1
-
If you had a dollar for every fake Netflix account hold text you got, what would you buy? It's important not to actually click on the links in these scam texts, which could lead to installing viruses or being brought to a fake site which tries to take your login information. #scam #scams #informationsecurity #cybersecurityIf you had a dollar for every fake Netflix account hold text you got, what would you buy? It's important not to actually click on the links in these scam texts, which could lead to installing viruses or being brought to a fake site which tries to take your login information. #scam #scams #informationsecurity #cybersecurity
-
Well this is a new way to possibly try to get me to reply to a possible scam. I have a feeling that if I reply, I’ll get a response like, “Oh sorry, well let’s get to know each other. By the way I know this fantastic crypto investment…” I don’t know this number, nor do I know anyone from the area code it was sent from. #informationsecurity #cybersecurity #scamWell this is a new way to possibly try to get me to reply to a possible scam. I have a feeling that if I reply, I’ll get a response like, “Oh sorry, well let’s get to know each other. By the way I know this fantastic crypto investment…” I don’t know this number, nor do I know anyone from the area code it was sent from. #informationsecurity #cybersecurity #scam
-
I’m back from vacation. :) I plan to make some kind of content in the future about posting about vacations on social media after returning from vacation, rather than during or before. #informationsecurity #informationsecurityawarenessI’m back from vacation. :) I plan to make some kind of content in the future about posting about vacations on social media after returning from vacation, rather than during or before. #informationsecurity #informationsecurityawareness
-
Hmmm, I’m not sure why the last video didn’t upload correctly. I plan to try uploading it sometime later.Hmmm, I’m not sure why the last video didn’t upload correctly. I plan to try uploading it sometime later.
-
At the moment, the fingerprint scanner is my favorite for MFA when paired with my password manager on my MacOS. #informationsecurity #cybersecurity #tech #technology #mfa #iam #gadget #apple #magickeyboard #2fa #infosecAt the moment, the fingerprint scanner is my favorite for MFA when paired with my password manager on my MacOS. #informationsecurity #cybersecurity #tech #technology #mfa #iam #gadget #apple #magickeyboard #2fa #infosec
-
Smartphone Privacy Screen Awareness
This is a short video to make you aware of the existence of privacy screens for smartphones basically. This is an iPhone, but some other smartphones have privacy screens available as well. The one I have on my iPhone in this video is from 3M.
#informationsecurity #informationsecurityawareness #privacy #privacyscreenprotector #privacyscreen #tech #technology #smartphone #3M #privacymattersSmartphone Privacy Screen Awareness This is a short video to make you aware of the existence of privacy screens for smartphones basically. This is an iPhone, but some other smartphones have privacy screens available as well. The one I have on my iPhone in this video is from 3M. #informationsecurity #informationsecurityawareness #privacy #privacyscreenprotector #privacyscreen #tech #technology #smartphone #3M #privacymatters -
This video introduces the YubiKey (https://www.yubico.com/products/), which reportedly for a time seemed to eliminate account takeovers through phishing at work, and this still may be the case. "
Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes, the company told KrebsOnSecurity." (Source: https://krebsonsecurity.com/2018/07/google-security-keys-neutralized-employee-phishing/). I've been using some YubiKeys, and I recommend trying these out at least.
#informationsecurity #cybersecurity #yubikey #informationsecurityawareness #cybersecurityawareness #fips #tech #technology #IAM #identityaccessmanagement #hardware #gadget #gadgets #YubicoThis video introduces the YubiKey (https://www.yubico.com/products/), which reportedly for a time seemed to eliminate account takeovers through phishing at work, and this still may be the case. " Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes, the company told KrebsOnSecurity." (Source: https://krebsonsecurity.com/2018/07/google-security-keys-neutralized-employee-phishing/). I've been using some YubiKeys, and I recommend trying these out at least. #informationsecurity #cybersecurity #yubikey #informationsecurityawareness #cybersecurityawareness #fips #tech #technology #IAM #identityaccessmanagement #hardware #gadget #gadgets #Yubico -
This is about a flash drive called the Aegis Secure Key (https://apricorn.com/flash-keys/) that can be used to keep confidential files more secure than otherwise. For example, even if the flash drive is stolen, it can be difficult for someone to guess the pin combination.
If you liked this video, please share it.
#cybersecurity #cybersecurityawareness #informationsecurity #informationsecurityawareness #tech #technology #usb #flashdriveThis is about a flash drive called the Aegis Secure Key (https://apricorn.com/flash-keys/) that can be used to keep confidential files more secure than otherwise. For example, even if the flash drive is stolen, it can be difficult for someone to guess the pin combination. If you liked this video, please share it. #cybersecurity #cybersecurityawareness #informationsecurity #informationsecurityawareness #tech #technology #usb #flashdrive
Mais stories