top of page


Day 8 - May 8 - A plea against using default passwords
This may sound obvious, but many, many people and organizations use default passwords on their networked devices. Please do not do this!...
Elizabeth Rasnick
May 8, 20232 min read
0 views
0 comments


Day 7 - The online scam that almost got me
Online scams have been around almost from the first day the internet went public. Scammers get more clever everyday, constantly evolving...
Elizabeth Rasnick
May 7, 20232 min read
0 views
0 comments


Day 6 - May 6 - Malware
The term malware is thrown around frequently, but most people don’t have a good handle on what exactly malware is. The word is actually a...
Elizabeth Rasnick
May 6, 20232 min read
0 views
0 comments


Day 5 - May 5 - What color is your hat?
This question is critically important in cybersecurity. It indicates whether you are a good hacker, a bad hacker, or a dubious hacker....
Elizabeth Rasnick
May 6, 20232 min read
2 views
0 comments


Day 4 - World Password Day
May the Force Be With You! Now that we have that behind us, it is also World Password Day. Why is this noteworthy, you may ask? It gives...
Elizabeth Rasnick
May 4, 20232 min read
0 views
0 comments


Day 3 - CIA (not the agency)
A cornerstone in cybersecurity is the CIA triad. In cybersecurity CIA stands for Confidentiality, Integrity, and Availability. Here’s a...
Elizabeth Rasnick
May 3, 20232 min read
0 views
0 comments


Day 2 - May 2 - The struggle to find the right balance between convenience and security
If we boil cybersecurity down to its essence, it comes to a balance between convenience for users of the systems and security of the...
Elizabeth Rasnick
May 2, 20232 min read
0 views
0 comments


Welcome to my 100 Days of Cyber!
David Meece challenged me to do this and so here we go. (Thanks to David. This is a great dare to have been given and accepted.) Day 1 -...
Elizabeth Rasnick
May 1, 20232 min read
3 views
0 comments
bottom of page