Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Reply To: OCU C)ISSO D Discussion Lesson 15

Kevin Mehok


I love that you discussed encryption and it’s connection to ransomware. Even good things with good intentions can be the most dangerous of weaponry in cyber attacks. Security threats and defenses do start with a plan, then the implementation of a strategy. I am learning that the aftermath of data breaches can be absolutely endless. The resources needed to regain consumer confidence and trust may be limitless.

Great job as always.

God Bless,



Please Note:

The support ticket system is for technical questions and post-sale issues.


If you have pre-sale questions please use our chat feature or email .