I'm a cybersecurity specialist from Dayton, Ohio. I have been providing professional cybersecurity advice for over 6 years. My area of expertise is a proactive approach to malware protection and online privacy.

I run training courses and workshops, on a variety of specialist subjects, several times a year. These courses are held in Dayton, Ohio and are normally of one day duration and include refreshments and lunch.

I can also arrange to run these courses in-house at our clients premises if that is the preferred method of delivery.

We will also prepare and develop specialist courses and workshops on topics requested by companies. For further information please call or email us.
Business continuity management
All businesses understand the need to keep running in case of disruption or disaster. But most are simply unprepared for breakdowns or have existing plans that are either totally out-of-date or have not been tested recently. Having the correct plan in place provides your company with a roadmap to continue operating under adverse conditions such as fire, flood, crime, IT failure or cyber-attack. All of these issues can seriously affect your company's profits and may give rise to litigation from clients or a failure to protect supply chains, clients and your stakeholders.

This workshop is aimed at middle managers, or personnel responsible for business continuity planning. At the end of the workshop delegates will have a practical knowledge of modern continuity planning and risk assessment. They will also understand how to construct a plan for their company and know how to test it and revise it.

IT, the law and data protection
Over the last ten years or so, a plethora of new primary legislation has been enacted, or revised, covering all aspects of information technology and the digital world we now live in. This brings up various key issues for the employer, for example, what they can do if they catch an employee tampering with or misusing company computers. Laws such as the Human Rights Act (1998) and the Computer Misuse Act (1990) have a direct bearing on these issues and the workplace. Not only do companies need to review their IT security, but also consider adding addenda to employment contracts to make it clear what employees can and cannot do on company computers. This one-day course will explain and examine current legislation and how it affects your business so that you are better prepared to protect yourself, and your company profits, against any potential civil or criminal claim.

At the end of this course delegates will have a practical understanding of current law affecting computers and information technology as applied to the workplace, particularly in respect of employees rights, and also how to safeguard your company if you need to carry out any in-house forensic investigations, due to suspicious activity or misconduct.
Participants will also receive detailed instructions on ensuring privacy on the Internet, in particular on the use of firewalls and VPN. Here https://chrome.google.com/webstore/detail/veepn-unlimited-free-fast/majdfhpaihoncoakbjgbdhglocklcgno?hl=en you can find the VPN service that I highly recommend for use.

Is cloud computing right for your business?
Cloud computing often adopts that fluffy white cloud symbol, which also symbolises 'the internet', but it is more than just that. Many people think it just stores files remotely such as using Dropbox, Microsoft One Drive and Google Drive, others think it just supports social networking such as Facebook, Gmail and YouTube, and the majority of consumers questioned say they don't use it or have never heard of it (source Citrix, 2011). Cloud computing is a distributed computer network where the end users' PC can utilise more powerful applications that are not on the local PC. Typical current applications range from Microsoft's Office 365 and Adobe's Creative Cloud to large applications such as Amazon Web Services. The technology has many advantages such as economies of scale but there are also security concerns such as who owns the data?, where is it stored?, how reliable is it and what are the security implications? This workshop will explain what cloud computing is, how it works, and the pros and cons of using it, including security issues and cost.

At the end of this course delegates will have a practical understanding of what cloud computing is, both in terms of storage and applications, and whether it is suitable for their business operation. They will also have a full understanding of any pitfalls of using it.

Cyber Security Workshop
I have a new course available for in-company presentation, either on a one-to-one basis or to small groups. This is a introduction to cyber security and about how to protect your company against online and offline security threats.
Recent Activity