Cybersecurity Safety

Welcome to the world of cybersecurity. This portion of the page is under development. If you have areas that you would like covered, please let me know what you would like to know more about. You can either use the IntenseDebate commenting system below, or email me at

When dealing with cybersecurity safety you will find that if you STOP, LOOK, and THINK you will find red flags. Reg flags are those things that let you know that something isn’t right. When I use the term vector, it just means a method to get the data that they want. When you stop, look, and listen you will find that most vectors use deception in some form combined with tugging at your emotions with a sense of urgency. They will gather pieces of information to make it seem that they are your friend, family, or coworker. Your job in protecting yourself is to learn to see those red flags and not fall for them. I will be gathering examples of deceptions that that have been used. You will be able to add them to your defenses.

I am going to start this off with a glossary. As I progress, the terms below will be links to more in depth pages.




SextortionSextortion is a form of sexual exploitation that employs non-physical forms of coercion to extort sexual favors from the victim. Sextortion refers to the broad category of sexual exploitation in which abuse of power is the means of coercion, as well as to the category of sexual exploitation in which threatened release of sexual images or information is the means of coercion.[1]

Spear Phishing