Blog
Right Gifts, Wrong Field

Right Gifts, Wrong Field

I had the pleasure of getting the story of how Michelle Pupoh, Senior Director of our Academy, made a massive career shift and landed where she is today. Here's what she shared: I trained to be a Marriage and Family Therapist. Eight years of learning about Freud,...

The Security of Christmas

The Security of Christmas

As 2022 comes to a close and we slow down to be with family and friends, we at the Carolina Cyber Center want to take a moment and reflect on the true meaning of the season and the hope of a secure future for those who believe.  For us, our ultimate security came...

Facing FFT: Fraudulent Funds Transfers

Facing FFT: Fraudulent Funds Transfers

On the first Friday in December, we had a Lunch and Learn to talk about the basics and fundamentals of cybersecurity for small and medium-sized businesses.  In a room full of these business leaders, one voiced their biggest fear: falling victim to a fraudulent...

How do I Know What a Data Breach Looks Like?

How do I Know What a Data Breach Looks Like?

Arguably no phrase has dominated the tech world the last 24 months more than the term “data breach.” From breaches that have impacted critical infrastructure like the Colonial Pipeline to hackers compromising healthcare records at UC San Diego Health, the last two...

Stay Cyber Secure in 4 Easy Steps

Stay Cyber Secure in 4 Easy Steps

If you’ve ever felt overwhelmed with the amount of negative news around cybersecurity, you’re not the only one. Cybersecurity has become one of the biggest hot topics both inside and outside of technology circles over the last two years. From securing learning devices...

Why We Should Communicate Cybersecurity Self-Efficacy

Why We Should Communicate Cybersecurity Self-Efficacy

Our words matter. It’s an interesting statement for the cybersecurity profession, isn’t it? But it’s true. Technical skills are necessary, as are discipline, curiosity, and good character. And so are our words: they frame the context of our cybersecurity goals....

Aksoy’s Cisco and 5 Tips to Avoid a Scam

Aksoy’s Cisco and 5 Tips to Avoid a Scam

Not all cybersecurity dangers come from hackers. Some come from a man in Florida with fake Cisco network devices. Onur Aksoy, a.k.a. ‘Ron Aksoy’ or ‘Dave Durden,’ has been charged with importing fake networking devices from China and Hong Kong, selling them, according...

Celebrate Gartner’s Top Eight Predictions–Then Prepare

Celebrate Gartner’s Top Eight Predictions–Then Prepare

Gartner’s top eight predictions for the next four years double down on one specific thing: organizations will, and must, adapt to face growing cybersecurity threats. At the Gartner Security & Risk Management Summit in Australia last week, analysts outlined these...