Mile2 Cybersecurity Institute

Misty Stewart

Forum Replies Created

Viewing 15 posts - 16 through 30 (of 98 total)
  • Author
    Posts
  • in reply to: OCU C)SP D Week 02 Lesson 05 Discussion #109605
    Misty Stewart
    Participant

    Hi Teisha,
    Your thoughts on the cybersecurity issues in 2020 show how fast companies had to adjust under pressure. Moving to remote work revealed weak spots in home networks and personal devices, which made them easy targets for phishing and ransomware. Your company’s quick setup of mobile workstations and use of ethical hackers shows a strong focus on using multiple layers of protection, which became more important as threats grew. VPNs helped keep remote connections safe, but as you mentioned, they had to be set up correctly to avoid creating new risks.

    in reply to: OCU C)SP D Week 02 Lesson 04 Discussion #109604
    Misty Stewart
    Participant

    Hi Teisha,
    You make a strong case for Defense in Depth as an important OWASP principle, especially with how quickly threats can change. The idea of using several layers of protection: like technology, processes, and people, shows that relying on just one method isn’t enough. Your company’s use of ethical hackers is a smart way to stay ahead of problems by finding and fixing weaknesses before they’re used against you. When combined with regular staff training, it helps build a culture where everyone plays a part in keeping systems secure.

    in reply to: OCU C)SP D Week 02 Devotion #109432
    Misty Stewart
    Participant

    The prophecy in Matthew 2:4–6 is a powerful reminder that Jesus’ arrival was not random or accidental it was divinely orchestrated and foretold with astonishing precision. Out of all the places on earth, He chose a humble village to welcome the King of Kings.
    This isn’t just about geography, it’s about identity. Jesus didn’t emerge from obscurity; He stepped into history with a legacy already written. His lineage, His mission, even the manner of His death were all laid out in Scripture long before His birth. That level of prophetic detail is not only statistically improbable it’s spiritually undeniable.
    So, when we’re asked, “Are you persuaded?” it’s more than a question of belief it’s a question of response. If God went to such lengths to announce His Son, how will we respond to that invitation? Will we dismiss it as coincidence, or will we lean in and listen?
    I believe these prophecies are not just evidence they’re an invitation. They call us to trust that God’s promises are true, that His Word is reliable, and that Jesus is exactly who He claimed to be the long-awaited Messiah. If He fulfilled those promises, we can trust Him to fulfill the ones He’s made to us today.

    in reply to: OCU C)SP D Week 02 Lesson 05 Discussion #109431
    Misty Stewart
    Participant

    In 2020, when many people started working from home, companies faced new digital security problems. One big issue was that employees used home Wi-Fi, which is often not secure, making it easier for hackers to break in. Many workers also used their own devices, which didn’t have strong security, increasing the risk of viruses, stolen data, and unauthorized access.
    Scams and fake emails became more common, with criminals taking advantage of COVID-19 fears. They sent messages about things like stimulus checks and vaccines to trick people into clicking harmful links. The FBI saw a big jump in reports of cyberattacks, as hackers targeted people working remotely.
    Another problem was with remote access tools like VPNs. Companies rushed to set these up, sometimes making mistakes or missing important updates, which left systems open to attack. IT teams had trouble keeping up with software updates, and some employees used weak passwords or didn’t have extra security steps like multi-factor authentication. Some staff also used apps or cloud services that weren’t approved, which made things less secure.
    Ransomware attacks and data breaches increased. Hackers would steal data before locking it up and then threaten to leak it publicly. About 1 in 5 organizations had a security breach linked to remote work. Many employees weren’t trained well enough for remote work risks, so they made mistakes like falling for scams or mishandling sensitive information. At home, documents and devices were more likely to be seen by family or visitors, which could lead to accidental leaks.
    To deal with these problems, companies improved employee training and focused more on security awareness. Many started using “Zero Trust” security, which means never automatically trusting anyone and always checking. They also invested more in cloud security tools, encryption, and better access controls. Finally, organizations updated their plans for responding to cyberattacks and worked together more to handle threats.

    in reply to: OCU C)SP D Week 02 Lesson 04 Discussion #109430
    Misty Stewart
    Participant

    One of the top OWASP security principles is Identification and Authentication Failures. Strong authentication and good session management are very important for keeping web applications safe. They help make sure that only the right people can access private information and features, and that users stay protected while using the app. Authentication is how users prove who they are. If this process is weak like using easy passwords, not blocking accounts after too many failed logins, or having unsafe ways to reset passwords attackers can break in by guessing passwords, using stolen login details, or tricking users. To prevent these problems, organizations should use multi-factor authentication, which asks for two or more types of proof, making it much harder for attackers to get in. They should also require strong passwords and block accounts for a while after several failed login attempts to stop people from guessing passwords.
    After a user logs in, session management keeps their account secure. If session management is weak, attackers can steal session tokens and pretend to be users. To stop this, it’s important to use tokens that are random and hard to guess, send them only over secure connections, make sessions expire after some time or inactivity, and cancel tokens right after logout or password changes. Protecting against cross-site scripting is also important, because attackers can use malicious code to steal session tokens.
    Security should cover everything users do, not just log in. This means protecting password resets, account recovery, and any actions that change what users can do or see. Organizations should make sure password resets require strong proof and don’t reveal private information, use role-based access control so users only get access to what they need, and keep logs to spot suspicious activity.

    in reply to: OCU C)SP D Week 01 Devotion #109293
    Misty Stewart
    Participant

    Matthew 1:20–21 shows an important moment in the story of salvation. Joseph is told by God that Mary’s baby is from the Holy Spirit, not from a man. This means Jesus was born in a special way, making Him different from everyone else. Because Jesus wasn’t born like other people, He didn’t have the sin that everyone else has. This made Him the only one who could take the punishment for our sins.
    People have argued about whether Jesus was real or truly God, but these questions show how important His life and message are. Christianity isn’t just about stories or good advice it’s about the bold belief that God came to earth to save us. The challenge is to live out that faith, learning from the Bible, using our gifts to help others, and spending time with other believers. In a world that can be confusing and sad, getting to know Jesus brings meaning, direction, and lasting happiness.

    in reply to: OCU C)SP D Week 01 Lesson 03 Discussion #109289
    Misty Stewart
    Participant

    Hi Teisha~ You gave a clear and helpful summary of the new security risks with mobile devices. I like how you explained that phishing and smishing tricks are getting smarter and can fool even people who know a lot about technology. Your point about apps asking for too many permissions is important, because many people don’t realize how much personal information they’re sharing. You also mentioned that using old devices, especially older Android phones, is risky and shows why it’s important to keep devices updated. Overall, your message is a good reminder that mobile security isn’t just about technology, it’s something we need to think about every day. As you said, staying aware and careful is key to keeping our personal and work information safe.

    in reply to: OCU C)SP D Week 01 Lesson 02 Discussion #109288
    Misty Stewart
    Participant

    Hi Teisha~ You’ve captured the essence of why well-defined security policies are so critical during an incident. I really appreciate how you broke down each type of policy and its specific role in guiding a coordinated response especially the emphasis on preparation, communication, and post-incident learning. It’s true that these policies aren’t just bureaucratic checkboxes; they’re strategic tools that empower teams to act decisively and minimize chaos. Your point about building trust is especially important stakeholders need to see that the organization is not only responsive but also proactive in its approach to security. Your discussion reinforces how structured policies transform reactive scrambling into confident, informed action.

    in reply to: OCU C)SP D Week 01 Lesson 01 Discussion #109284
    Misty Stewart
    Participant

    You did a great job showing all the ways third-party audits are valuable. I like how you pointed out that they help build trust having someone outside the company check things makes everyone feel more confident and shows the company is honest. You also made a good point about reducing risks; finding problems early can save a company a lot of trouble and money later. I thought it was smart to mention that feedback from auditors can help companies get better, not just follow rules. In industries with lots of regulations, outside advice can help a company succeed instead of just getting by. Overall, you clearly explained how third-party audits protect companies and help them grow.

    in reply to: OCU C)SP D Week 01 Lesson 03 Discussion #109236
    Misty Stewart
    Participant

    In 2022, mobile phones faced a growing number of security threats that made users more vulnerable than ever. Many harmful apps were disguised to look trustworthy, tricking people into downloading them and unknowingly giving away personal information like passwords, banking details, or location data. These apps could also damage the phone’s performance or open the door for further attacks. Scams became more advanced too—fake texts, emails, and social media messages often looked convincing and were designed to fool users into clicking dangerous links or sharing sensitive information. Public Wi-Fi networks added another layer of risk, since many lacked proper security, allowing hackers to intercept data or spy on online activity. Devices that weren’t updated regularly were especially at risk, as outdated software often had known weaknesses that attackers could easily exploit. These issues didn’t just affect individuals, they also posed a threat to workplaces, since compromised phones could give hackers access to company systems and data. As mobile phones became more central to everyday life, both personally and professionally, the impact of these threats grew more serious. That’s why it’s so important for users to stay alert, keep their devices updated, avoid suspicious links, and use strong security settings to protect themselves.

    in reply to: OCU C)SP D Week 01 Lesson 02 Discussion #109228
    Misty Stewart
    Participant

    An effective process to company incidents relies on well-defined guidelines that enable swift action and teamwork during security breaches or operational failures. An incident response policy should be created outlining roles, reporting procedures, and communication methods, so everyone understands their roles. The policy must explain each step and who to contact in case of an emergency. A data classification and handling policy is also crucial, as it helps prioritize incidents based on the sensitivity of the information involved. Continuous oversight is provided by a logging and monitoring policy, which ensures systems are regularly checked for unusual activity, allowing for early detection and investigation of problems. Technical teams benefit from a containment and eradication policy, which instructs them on isolating compromised systems and removing threats without causing further disruption. A recovery policy details the steps for restoring normal operations safely, including the use of backups and system verification. Lastly, a post-incident review policy drives improvement by requiring documentation, analysis, and reflection after each event. Together, these policies strengthen the organization’s resilience, accountability, and readiness for future challenges.

    in reply to: OCU C)SP D Week 01 Lesson 01 Discussion #109226
    Misty Stewart
    Participant

    A third-party audit involves having outside experts examine how a company operates and manages its systems. This process is valuable because it enhances the company’s trustworthiness and transparency. Unlike internal checks, third-party audits are conducted by individuals who are not part of the company, ensuring an unbiased perspective. This impartiality helps customers, investors, and regulators feel more confident in the company’s practices. The main benefits of third-party audits include the ability to spot problems or risks that internal staff might overlook, gaining approval from respected external groups which demonstrates high standards, and identifying weaknesses in security or operations before they become serious issues.
    Industry compliance, on the other hand, refers to following the rules and standards set for a specific field. Companies that maintain compliance not only avoid legal trouble but also enjoy several advantages. These include consistent operations through standard procedures that reduce mistakes, access to markets where compliance is required—such as healthcare or finance—a stronger reputation that helps the company stand out from competitors, and ongoing improvement as compliance rules often require regular updates to keep pace with new technology and practices. In summary, third-party audits and industry compliance are not just about meeting requirements; they help companies remain responsible, resilient, and successful, fostering a culture of excellence that benefits both the organization, and everyone connected to it.

    in reply to: OCU C)HT C Discussion Lesson 13 #107584
    Misty Stewart
    Participant

    Hi Teisha,

    Thank you for your response. You’ve made a great point about the importance of environmental and safety procedures. Managing things like temperature, humidity, and ventilation is often overlooked, but it’s crucial for protecting both equipment and people. When these factors are tailored to the organization’s needs, they help keep things running smoothly and extend the life of the equipment. Your focus on safety is also very important. In high-risk industries like electric cooperatives, safety is more than just a set of rules—it’s a culture. It’s impressive that your organization prioritizes safety for everyone, not just those in the field. This approach makes all employees feel supported and protected, which boosts morale and productivity. As you said, these procedures may seem small, but they are key to long-term success.

    in reply to: OCU C)HT C Discussion Lesson 13 #107583
    Misty Stewart
    Participant

    Hi Carlos,

    You’ve done a great job explaining how things work and why they’re important. Standard Operating Procedures (SOPs) and Inventory Management Procedures help organizations stay organized and in control. SOPs make sure that everyday tasks, like dealing with customer complaints, are done the same way every time. This helps improve service and reduce mistakes. Inventory procedures help manage stock efficiently, so there’s no over-ordering, less waste, and smoother operations. These practices not only make things run better and save money but also help the team work towards the company’s goals. Your final comment adds a nice personal touch—thanks for sharing!

    in reply to: OCU C)HT C Discussion Lesson 12 #107582
    Misty Stewart
    Participant

    Hi Caleb,

    Thanks for the summary—it really highlights the key points in Wi-Fi’s development and security. Wi-Fi has improved a lot since the early days of 802.11b, which was slow and unreliable. Each new version—802.11g, 802.11n, 802.11ac, and now 802.11ax (Wi-Fi 6)—has brought big improvements in speed, range, and the ability to handle more devices at once, which is great for busy homes or offices. On the security side, you’re right that encryption is very important. WEP is no longer safe, while WPA and WPA2 have provided stronger protection for many years. WPA3 now offers the best security, especially against common threats like password cracking. As you mentioned using outdated Wi-Fi standards or weak encryption can slow down your network and make it vulnerable to attacks, so it’s important to keep everything updated.

Viewing 15 posts - 16 through 30 (of 98 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.