Teisha Nolen
Forum Replies Created
-
AuthorPosts
-
Teisha Nolen
ParticipantGreat post, Misty! You have highlighted some serious mobile security concerns. It’s unsettling how easily a disguised app or convincing text can compromise not just personal data, but entire company systems. With mobile phones now acting as minicomputers in our pockets, we are opening ourselves up to these threats. Public Wi-Fi, outdated software, and overly trusting clicks are gateways for attackers. I believe many users still underestimate the risks. A single compromised device can expose sensitive business data, making mobile security not just a personal responsibility but a workplace priority as well.
How often do we actually review our app permissions or update our devices intentionally? In a world where convenience often wins, how can we balance ease of use with proactive protection? Is there a mobile habit you think people should change to stay safer?Teisha Nolen
ParticipantMobile devices have become essential to our daily lives, but they also come with serious security risks. In 2022, there were several potential risks with mobile devices. One major threat was phishing and smishing (phishing via text), where attackers tricked users into clicking malicious links or sharing sensitive info. These scams often looked legitimate, making them hard to spot.
Another growing concern was mobile malware and spyware. Some apps—especially those downloaded outside official app stores—were designed to steal data, track activity, or even control devices remotely. Public Wi-Fi also posed risks, exposing users to man-in-the-middle attacks where hackers could intercept communications.
Even seemingly harmless apps could be problematic. Many requested excessive permissions, leading to data leakage without users realizing it. Devices that missed regular updates were left exposed to known security flaws. This was especially true for older Android versions which often lacked timely patches, causing them to be easy targets.
All of this can lead to identity theft, financial loss, and even corporate breaches if work devices are compromised. Staying informed, using mobile security tools, and being cautious with downloads and links are key steps to staying safe.Teisha Nolen
ParticipantWhen a security incident hits, having strong policies in place can make all the difference for your organization. First, an incident response policy lays out the steps—from preparation to recovery—so that everyone knows what to do. A classification policy helps teams prioritize threats, while a reporting policy ensures incidents are flagged and escalated quickly. Clear communication policies keep stakeholders informed without causing panic, and response time policies set expectations for how fast issues should be addressed. Assigning roles through a responsibilities policy avoids confusion during high-pressure moments. Finally, a post-incident review policy helps teams learn from what happened and improve for next time.
These aren’t just formalities—they can be considered your playbook when things go wrong. When done right, they build trust, reduce downtime, and strengthen your organization’s security posture.Teisha Nolen
ParticipantGreat post! You have outlined a solid foundation for incident response! Clear policies empower teams to act swiftly and confidently. How often do you think organizations should revisit and update these policies to stay aligned with evolving threats and compliance standards? Could outdated protocols unintentionally increase risk during a real-world incident?
Teisha Nolen
ParticipantGreat post, Addison! Third-party audits offer unbiased insight into your security posture, helping identify hidden risks and validate compliance with industry standards. They definitely build trust with clients and regulators, they improve operational efficiency, and ensure you are not just meeting your requirements, but strengthening your defenses. Third-party audits are a smart move for long-term resilience.
Teisha Nolen
ParticipantWhen it comes to security and compliance, third-party audits are a game-changer. They’re not just about checking boxes—they’re about having an unbiased expert take a deep look at your systems to make sure everything’s secure and up to standard. Internal teams can miss things, especially when they’re too close to the process. That’s where a fresh set of eyes really helps.
Third-party audits also build trust. Whether it’s clients, partners, or regulators, people feel more confident when they know your organization has been independently verified. Plus, these audits often align with major industry standards, which can open doors to new business opportunities.
And let’s be honest—compliance isn’t just about avoiding fines. It’s about protecting data, improving operations, and staying ahead of threats. A good audit can highlight risks before they become problems and help you strengthen your security posture across the board.Teisha Nolen
ParticipantGrowing up Catholic, I knew the stories of Jesus well. I understood Him as the Son of God, the second Person of the Trinity. I could recite Scripture, explain His miracles, and share His teachings. I thought that meant I knew Him. I pursued knowledge—studying the Bible, learning all I could about Jesus. But over time, I realized that though I had learned a great deal about Him, I didn’t truly know Him.
That changed in adulthood when I accepted Jesus as my Savior. I began seeking Him—not just in study, but in prayer, in Scripture, and in the quiet guidance of His Spirit. The shift came when I moved from knowing Jesus intellectually to knowing Him with my heart. That heart-level relationship transformed everything. Jesus became more than a figure in history—He became my Redeemer, my Friend, my Lord.
Teisha Nolen
ParticipantHi James!
Great post highlighting the importance of safety initiatives, as well as professionalism in business. Both are extremely important. I work for an electric cooperative and safety is part of our mission and culture as an organization. It literally affects everything we do. All of our employees are trained in-house on first aid and CPR, and field staff are given additional training in emergency response. We have an entire department that travels around job sites to ensure that our linemen and field techs are working safely. For jobs such as these, initiatives like this can mean the difference between someone not going home. Safety is of the utmost importance!Teisha Nolen
ParticipantTwo operational procedures that are valuable to any organization are environmental procedures and safety procedures. Environmental procedures are key to ensuring that our work environments are safe for equipment as well as for the people operating the equipment. Details such as proper temperature, ventilation, and humidity are important to the life of equipment. Ensuring that these environmental factors are optimized based on the equipment you are using, as well as organizational need, will go a long way in setting up your organization for operational success.
Additionally, an organizational focus on safety is vital to the success of any organization. I currently work for an electric cooperative, and safety is one of the largest parts of our organizational mission and culture. It is easy to focus on safety for field techs and linemen who are put in harm’s way daily, but it is more than that. We want to be certain that each employee, from the linemen to the warehouse workers, to the office staff, have what they need to do their job efficiently and safely.
Once again, though it may seem like a small thing, operational procedures such as these are absolutely vital to running a successful business.Teisha Nolen
ParticipantHi Caleb!
Great summary of the different Wi-FI standards and how they have evolved over the years. I am old enough to remember a time before the internet was readily available and was well into adulthood before I had internet in my home. The first internet I had in my home was dial-up. I have always been fascinated with technology and the speed at which it evolves. Great post!Teisha Nolen
ParticipantWi-Fi technology, as with any technology, seems to be ever-evolving. Each iteration of Wi-Fi standard offers improvement in speed, frequency, reliability, or all of the above. Early standards, such as 802.11a and b, laid important groundwork, but modern versions, such as 802.11ac and 802.11ax (Wi-Fi 6), deliver higher speeds and enhanced performance in crowded environments. Wi-Fi 7 (802.11 be) pushes the boundaries even further with near instant response times and the ability to operate across multiple frequencies.
Encryption is another important consideration when it comes to securing wireless networks. WEP and WPA are outdated and, therefore, more vulnerable to attacks, while WPA2 with AES is more secure, causing it to be more widely used. WPA3 is the latest protocol and offers more protection against brute-force attacks, as well as improved privacy. Choosing the right Wi-Fi version and encryption makes a big difference in both speed and security.Teisha Nolen
ParticipantThis devotional is challenging, but I believe, as with everything, it all comes down to that relationship with God. The “God loves you” message does draw you in, and many can be fooled into thinking “good enough” is good enough when it comes to checking the “religion” box. The difference is in the relationship. Our relationship with God will guide us in all aspects, including how we deal with our sin. Anything that is honored above God can be considered sin. By that definition, something that is sin for me may not be sin for another. It all boils down to that relationship, to giving your heart and life to God and obeying where He leads. A heart that hungers for God, and a life fully submitted to God, is where the focus needs to be. He will show you the rest.
Teisha Nolen
ParticipantHi James!
Great summary on the difference in the various cables. Though I knew a little about the cables prior to this course and studying chapter 9, I didn’t realize the differences in uses. For instance, using UTP in an industrial setting probably wouldn’t work very well as there would be a lot of interference or electronic noise. By the same token, it wouldn’t make sense to pay for installation, or go through the trouble of installing STP in a home office. Great job on your post!Teisha Nolen
ParticipantWhen choosing networking cable, it’s important to understand how each type functions and where it’s best applied. Unshielded Twisted Pair, or UTP, is the most common choice for Ethernet and telephone connections. It’s cost-effective and easy to install, especially in low-interference environments like homes or standard offices. However, it lacks shielding, which makes it more vulnerable to electromagnetic interference.
Shielded Twisted Pair (STP) offers an improvement in environments where interference is a concern. Thanks to its shielding around the wire pairs, it performs better in industrial settings or areas with lots of electronic noise. This added protection ensures stronger signal integrity, although it typically comes at a higher cost and requires careful grounding.
Coaxial cable is built for long-distance and high-bandwidth transmissions. Its layered design, with a central conductor and substantial shielding, makes it highly resistant to interference. Coaxial cable is widely used in cable television, internet services, and CCTV systems.Each cable type serves distinct purposes based on performance needs and environmental conditions. Selecting the right one depends on factors like distance, signal strength, and potential for interference.
Teisha Nolen
ParticipantIn today’s world we enjoy freedoms that weren’t always available in the time of John the Baptist. Though not completely free from religious persecution, in our world losing your physical life for your faith isn’t as common. That doesn’t mean that we can’t glean anything from the lesson. In Matthew 16:25 we read “For whoever wants to save their life will lose it, but whoever loses their life for me will find it” (Matthew 16:25, NIV). Laying down your life for the Lord can mean the physical ending of life, but it can also be more symbolic. Though I may not lay down my actual life each day, I can lay down my will, my desires, my actions in favor of the will of God, the desires of God and the actions I am led by God to take. By “losing” my life in this way, I find my life in the will of God and in HIS strength I am led to accomplish his purpose for me.
Holy Bible, New internation Version https://www.biblegateway.com/passage/?search=Matthew%2016%3A25&version=NIV
-
AuthorPosts