On this page you will find resources related to Cybersecurity and the wide range of topics that fall under this category.  In my current role, I work as a contractor to the U.S. Federal Government as the IT Operations & Cyber Security Manager and hold a Top Secret security clearance.  The agency I work for has an essential national security mission and a presence across the United States.  In my role I become involved in digital forensics, incident response, malware reverse-engineering, vulnerability management, security engineering, network security, purchasing, budgeting, metric development, and other technical and administrative cybersecurity functions.


Cyberattacks and How To Protect Your Computer and Data – Part 3 of 3

If you have been following this blog series, you know that the first blog discussed the cyberattack kill chain and how…

Posted in Cybersecurity | Tagged , , , | Leave a comment

Cyberattacks and How To Protect Your Computer and Data – Part 2 of 3

In my first blog, I discussed the cyber kill chain and how hackers move through predictable steps to launch an…

Posted in Cybersecurity | Tagged , , , | Leave a comment

Cyberattacks and How To Protect Your Computer and Data – Part 1 of 3

Cyberattacks and data breaches are unfortunately commonplace in the daily news cycle. Many of us have had our personal, healthcare,…

Posted in Cybersecurity | Tagged , , , | Leave a comment

The digital breadcrumbs in the Parkland, FL shooting: Were they followed?

As more details emerge from the horrible mass shooting in Parkland, Florida on February 14, 2018, one item of interest…

Posted in Cybersecurity | Tagged , , | 2 Comments

Windows 10 Parental Control Settings

I received a significant amount of feedback from my recent post on how to setup parental controls with iOS 10…

Posted in Cybersecurity, Information Technology | Tagged , , | 11 Comments

iOS 11 Parental Control Settings

I have discussed here and here many of the dangers that kids face when trying to navigate technology and the…

Posted in Cybersecurity, Information Technology | Tagged , , , , | 18 Comments

Who Are You Allowing in Your House at Night?

  If I were to ask you to install an exterior door in your child’s bedroom and told you that…

Posted in Cybersecurity | Tagged , , | Leave a comment

Comments (6)

Dear Josh,

I am writing to ask you for a recommendation regarding my daughter’s online (and/or texting, phones, etc) activity on her iPhone, iPad and MacBook.

I recently came across TeenSafe but my daughter dose not have a separate ID and Password for iTune and it seems like that is the way they monitor child’s activity. Giving them my ID and password (that I share with my daughter dose not seem like good idea or even helpful).

I did a free trial of Qustodio but it did not seem to be accurate. For example my daughter does not even have a facebook account and Qustodio was reporting activity on facebook.

So I am wondering what your recommendation is.

P.S. I am sorry for writing here. My email to you returned suggesting “The e-mail message could not be delivered because the user’s mailfolder is full”

Sorry about that, I had an issue with my inbox that I just discovered today. I don’t have experience with either of those products you have mentioned. I have always just used builtin parental controls on iOS devices and Mac OS X to accomplish what you are trying to do. For iOS devices, I would follow this link: and for Mac, I would follow this link:

Thank you very much for your response. We would definitely want to buy/use a drone. Is there a device similar to wireless sniffer that only detects the weakness of a network without having the capability of hacking/accessing inone’s data? The idea is to use the drone and that potential device on all the houses in our community and then alarm the owners if their network is “hackable”. As an alternative we may obtain consent of the neighbors to do so. But we prefer a device that is not able to access people’s data but can detect weakness in their network. I would appreciate your feedback.

Yes, you could use a tool such as NetStumbler or Kismet to scan for wireless access points that may be running without the proper security in place.

Hi Josh

This was a very interesting article you wrote:
Do you have any suggestion for making a science fair project out of it for a 9th grader?

Thanks – the implications of how drones can be used in cybersecurity is interesting. Depending on how much you want to spend, you could buy a drone and make it a wireless access point, showing how you could create a rogue access point, or place a wireless sniffer on the device like I wrote about in the article you mentioned and show how it could be used to sniff network traffic. If you did these, be sure to only do so on your personal network and be aware of your state’s cyber crime statutes.

Leave a comment

Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.