All Posts By

Jeremy Wheeler

The State of IoT

By Cybersecurity, Internet of Things

This is the seventh article in our 10-part series for National Cybersecurity Awareness Month. Look for new cybersecurity topics explained by Alpine Cyber experts every Tuesday and Thursday in October.  Revisiting the Topic Nearly 4 years ago I wrote a primer and deeper dive into the Internet of Things (IoT) explaining what it was and the security aspects you should consider when leveraging this class of technology. So how have things evolved in that time? What is still relevant and have things gotten better or worse? Well here’s an update… Consumer Exposure For one, you don’t really hear the term…

Read More

To Freeze Or Not To Freeze… That Is The Question

By Cybersecurity

This is the fifth article in our 10-part series for National Cybersecurity Awareness Month. Look for new cybersecurity topics explained by Alpine Cyber experts every Tuesday and Thursday in October.  The Big Breach The flood of data breaches in recent years makes poor data security seem like the norm. We seem a little desensitized whenever XYZ social media service falls victim to a data breach. But there was one breach that caught the public’s attention in a major way. We’re talking the big one…the Equifax breach. Would you believe it’s been over 2 years since they announced that publicly? People…

Read More

Horton Hears A Host! – Part 3

By Cybersecurity

Welcome to the third post in our multi-part Seusstastic series on the real threats that face home networks, where we apply real-world enterprise grade protections to keep ourselves safe in the connected world. If you haven’t read part 1 or part 2, I highly recommend you take a few minutes and do so. We’ve covered how cyber thieves are constantly testing and scanning for vulnerabilities and what you can do to start acting like the bad guy – finding the systems on your network. We left you with the following point: devices that we previously would never have imagined to exist on a…

Read More

One Host, Two Hosts, Red Host, Blue Host – Part 2

By Cybersecurity

This is the second post in our multi-part Seusstastic series on the real threats that face home networks, where we can apply real-world enterprise grade protections to keep ourselves safe in the connected world. First off – If you haven’t read part 1, I highly recommend you take 5 minutes and do so. In part 1, How The Grinch Stole… Your Information, I presented a simple construct: Cyber thieves are not only just outside your physical and digital homes, they are constantly testing and scanning for vulnerabilities. The argument is simple: Thieves will be thieves and you can’t just sit back…

Read More

How The Grinch Stole… Your Information – Part 1

By Cybersecurity

This is the first post in our multi-part Seusstastic series on the real threats that face home networks, where we can apply real-world enterprise grade protections to keep ourselves save in the connected world. We’ll start out by stating the obvious: Thieves stink. Nobody likes to get robbed. More so, nobody likes to admit that they didn’t prevent thieves from entering their house and taking their stuff. So generally speaking, it is always a good idea to lock your house’s windows and doors. Apply that same mindset to your home network. When most people think of their network, they focus on…

Read More