Mile2 Cybersecurity Certifications

Carlos Martes

Forum Replies Created

Viewing 15 posts - 1 through 15 (of 96 total)
  • Author
    Posts
  • in reply to: OCU C)SP D Week 05 Lesson 10 Discussion #110774
    Carlos Martes
    Participant

    Companies today face many cybersecurity risks such as phishing, malware, ransomware, insider threats and data breaches. These attacks can lead to stolen data, financial loss, and even damage to reputation. One major vulnerability comes from weak passwords, unpatched systems and lack of employee awareness. To reduce these risks, organizations should create strong security policies, such as enforcing multifactor authentication, using firewalls and antivirus protection and regular updating software. Employee training is also critical to help staff recognize suspicious emails or links. Companies should perform regular security audits and backups to recover data in case of an attack. Having an incident response plan ensures a quick reaction to any breach. By combining organizations can greatly lower their chances of network compromise and protect sensitive data from modern cyber threats.

    in reply to: OCU C)SP D Week 05 Devotion #110773
    Carlos Martes
    Participant

    This world indeed leaves us wanting more, more money, food, pleasure and other miscellaneous things. I can honestly say that there are times when wanting “more” comes into mind. Having to remind myself that being with the Father and His incredible blessings will satisfy our soul. We crave for His word, to be with Him and share the gospel to all who are in that sense of depravity. For in this world, everything is only temporary. My only goal in this life is to be able to share the Good News to all and that they experience the same hunger and thirst for His righteousness and beat the flesh once and for all.

    in reply to: OCU C)SP D Week 04 Lesson 09 Discussion #110664
    Carlos Martes
    Participant

    Good afternoon Addison! Another great post!
    Cryptography protects information by turning data into unreadable code that only authorized users can unlock. It keeps messages, banking, and passwords safe, ensuring privacy and trust. It also maintains data integrity, confirms identities, and prevents cyberattacks. Overall, cryptography keeps online communication and sensitive information secure in todays digital world.

    in reply to: OCU C)SP D Week 04 Lesson 08 Discussion #110663
    Carlos Martes
    Participant

    Hello Addison,

    Great post! Access controls keep company data safe by limiting who can see or change it. They prevent leaks, protect sensitive info, and ensure only authorized users can access files. Strong passwords, two step verification, and job based permissions help enforce these rules, reducing risks from hackers, mistakes, and data breaches.

    in reply to: OCU C)SP D Week 04 Devotion #109878
    Carlos Martes
    Participant

    This is a really interesting topic as it resonates to me. I often forget to tell myself that i can never be perfect, and to BE perfect is to say that Jesus’ sacrifice was for nothing. We have to understand that we live in a world that is filled with lies, deception, and evil in general. I struggle nonetheless, but I remind myself that Jesus is always with me, His helper, the Holy Spirit inside us that burns hot for Christ. I am not the same person I was before coming to Christ, and now I am able to resist those temptations more frequently and easily only because that same empowerment that Jesus had, we have in us. Carrying to cross daily, keeping up with the fight and living through Christ is the only path that allows me to love Him more.

    in reply to: OCU C)SP D Week 04 Lesson 09 Discussion #109877
    Carlos Martes
    Participant

    Cryptography is the process of protecting information by converting it into a secure format that only authorized users can understand. t ensures that sensitive data, such as passwords, financial records, or personal information that stays private and cannot be accessed by hackers. Cryptography helps maintain data integrity, meaning the information cannot be changed or tampered with without detection. Common methods include encryption, which scrambles data into unreadable code, and hashing, in which verifies that data has not been altered. Digital signatures also play a key role by confirming that a message or file truly came from a trusted source. These tools work together to ensure confidentiality, integrity, and authenticity of information. In todays digital world, cryptography is essential for secure communication, online banking and protecting company and personal data from cyber threats, helping organizations build trust and maintain compliance with security standards.

    in reply to: OCU C)SP D Week 04 Lesson 08 Discussion #109876
    Carlos Martes
    Participant

    Access controls play a key role in protecting company data by managing who can access specific systems, files, or information. They ensure that only authorized employees can view or modify sensitive data. This helps prevent data breaches, insider threats and accidental leaks. Access control policies define how users are authenticated such as through passwords, biometric or multifactor authentication and by what level of access each employee has based on their role. For example, an accountant might have access to financial data, while others cannot. These policies also track user activities to detect unusual behavior and strengthen accountability. By enforcing strong access controls and regular reviewing permissions, companies can safeguard sensitive information, maintain compliance with laws, and reduce the risk of cyberattacks. Ultimately, access control helps build a secure and trustworthy work environment that protects both the company and it’s clients.

    in reply to: OCU C)SP D Week 03 Lesson 07 Discussion #109792
    Carlos Martes
    Participant

    Great post Addison,
    A company can use different controls to keep its network safe, First are administrative controls, like security policies, employee training and rules about passwords or access. These guide people on how to protect company data. Then there are technical controls, such as firewalls, antivirus software, encryption, and intrusion detection systems. These protect the network from hackers and malware. Lastly, physical controls include locked server rooms, security cameras and ID badge access to keep equipment secure. Using all three types of controls together builds a strong protection for the company’s network and keeps data safe from both sides and outside threats.

    in reply to: OCU C)SP D Week 03 Lesson 07 Discussion #109791
    Carlos Martes
    Participant

    When securing a company’s network, implementing multiple layers of controls is key. Administrative controls include security policies, employee training, and access management procedures. These define how users and systems should behave to protect company data. Technical controls involve firewall, intrusion detection systems, antivirus software and encryption, which safeguard digital assets from unauthorized access and cyber threats. Physical controls such as locked server rooms, surveillance cameras, and restricted access protect hardware and infrastructure. Companies can also use network segmentation to isolate sensitive data reducing exposure if breach occurs. Regular audits, vulnerability assessments, and timely updates further strengthen security. Altogether, combining administrative, technical and physical controls creates a strong defense system, to ensure the company’s network remains secure and resilient against both internal and external threats.

    in reply to: OCU C)SP D Week 03 Lesson 06 Discussion #109789
    Carlos Martes
    Participant

    Hello Derrick,
    Great post and good explanation on the difference between SSD and HDD. Currently, people today utilize SSD as what you said, are faster and more relatable when it comes to higher end PCs. While most organizations use USB drives to temporarily transfer data, it is also something that causes a slight concern, as it is not always the best option to use. Cloud storage is another example where it has become quite the essential in todays usage even in most organizations today.

    in reply to: OCU C)SP D Week 03 Devotion #109701
    Carlos Martes
    Participant

    Pursuing righteousness from God indeed would lead to spiritual calamity. It is written that in the Bible, it warns us against this mindset because human righteousness alone is like filthy rags. We see this in the world currently where it is displayed and then leads to comparing others and setting pride in the center of it. This attitude can lead to spiritual blindless, like the pharisees who trusted in their own law keeping instead of seeking mercy. True righteousness comes from only through faith in Christ alone. We have to remind ourselves that it’s not about what we do, but what Jesus did for us on the cross. Entrusting in him constantly can help us from falling into self righteousness and helps us walk in genuine love and dependance on Him.

    in reply to: OCU C)SP D Week 03 Lesson 06 Discussion #109692
    Carlos Martes
    Participant

    There are several types of data storage options, each with different uses and advantages. primary storage refers to memory like RAM, which is fast but temporary. It stores data that the computer is actively using. Secondary storage, such as hard drives and solid state drives keeps files permanently and offer larger capacity. HDDs are cheaper but slower, while SSDs are faster and more reliable. External storage like USB drives and external hard drives provides portability and backup options. Cloud storage stores data online, allowing remote access and easy sharing. Optical storage and network attached storage are also used for backups and shared access in offices. Each option is chosen based on speed, capacity, cost and purpose. SSD would be chosen for performance, cloud accessibility and external drives for backup and transfer. Together, these systems ensure data is secure, accessible and efficiently managed.

    in reply to: OCU C)SP D Week 02 Lesson 05 Discussion #109603
    Carlos Martes
    Participant

    Good post Willy,
    The pandemic forced companies to move to remote work quickly, which exposed ,many to cybersecurity risks. Employees often used personal devices that lacked workplace security standards. As a result, COVID-19 caused a 50% rise in cyberattacks, around 30,000 related scams, malware or ransomware exploiting pandemic fears.

    in reply to: OCU C)SP D Week 02 Lesson 04 Discussion #109414
    Carlos Martes
    Participant

    Good explanation Caleb,
    Defense in depth means using several layers of protection instead of relying on one. Like locking your doors, setting alarm, and having cameras-it makes it difficult for hackers to access in the general aspect. Even if one layer fails, others like encryption or access control keeps data safe and systems secure.

    in reply to: OCU C)SP D Week 02 Devotion #109371
    Carlos Martes
    Participant

    I strongly believe that the bible is true and that it was God breathed as stated in 2 Timothy. It explains that the Bible was written by those who were moved by the Holy Spirit, God utilizing them to write their recordings of His teachings. I can understand as to why people would discredit it due to it being written by man, but God does not break his promises, especially when he means that the bible is truth Itself. God constantly revealed himself to man throughout the old testament to the New testament. HE authored it, history confirmed it, prophecy’s were fulfilled, and even Jesus Himself declared it.

Viewing 15 posts - 1 through 15 (of 96 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.