C3 Team
Why We Should Communicate Cybersecurity Self-Efficacy

Why We Should Communicate Cybersecurity Self-Efficacy

Our words matter. It’s an interesting statement for the cybersecurity profession, isn’t it? But it’s true. Technical skills are necessary, as are discipline, curiosity, and good character. And so are our words: they frame the context of our cybersecurity goals....

Aksoy’s Cisco and 5 Tips to Avoid a Scam

Aksoy’s Cisco and 5 Tips to Avoid a Scam

Not all cybersecurity dangers come from hackers. Some come from a man in Florida with fake Cisco network devices. Onur Aksoy, a.k.a. ‘Ron Aksoy’ or ‘Dave Durden,’ has been charged with importing fake networking devices from China and Hong Kong, selling them, according...

Cybersecurity Awareness Resources

Cybersecurity Awareness Resources

We’re passionate about forging a more secure North Carolina, and part of that means helping everyone stay cyber secure. Thankfully, we’re not alone in that—we’ve compiled a brief list of resources produced by others in the cybersecurity industry that not only are safe...

Celebrate Gartner’s Top Eight Predictions–Then Prepare

Celebrate Gartner’s Top Eight Predictions–Then Prepare

Gartner’s top eight predictions for the next four years double down on one specific thing: organizations will, and must, adapt to face growing cybersecurity threats. At the Gartner Security & Risk Management Summit in Australia last week, analysts outlined these...

3 Reasons to Upskill This Year

3 Reasons to Upskill This Year

Recent media buzz about tech layoffs at Coinbase or other tech businesses gives us an excellent opportunity to think about what it will take to stay marketable in the cybersecurity industry. Even though CompTIA reports that the “projected growth rate for tech jobs...

Cybersecurity and Hacktivism: Where’s the Line?

Cybersecurity and Hacktivism: Where’s the Line?

We train people to hack. Should we? Between hacktivists siding with Ukraine and going rogue against Russia, a single hacker taking down the entirety of North Korea’s internet in retaliation, and the new GoodWill ransomware virus that holds data ransom and demands good...

4 Takeaways from Verizon’s 2022 DBIR

4 Takeaways from Verizon’s 2022 DBIR

It’s one of our favorite times of the year: the release of Verizon’s Data Breach Investigation Report. Verizon's 2022 DBIR is chock full of crucial statistics and trends in the cyber realm; I’ll highlight just four, and then unpack them. 1. Small businesses (very...

Flip the Script and Begin Your Cyber Career

Flip the Script and Begin Your Cyber Career

Fear and doomsday predictions fill the news, and there is a lot of material to work with: war in Ukraine, Russian hacking threats, economic downturns, and skyrocketing gas prices. What if there is a bright side? Insider recently reported 3 warning signs of a...

The Everyday Struggle to Survive and Protect

The Everyday Struggle to Survive and Protect

I still remember the moment I was alerted that the password used for my company’s cloud storage—where we stored our backups, our data, essentially everything we wouldn’t want to be misplaced or stolen—had been compromised in a data breach. It was a heart-stopping...