X: @FlynnInfoSec1

A bit or two about myself: I was born in Germany, educated in the US, and now live in beautiful Oregon. I am passionate about technology and the benefits our modern digital devices and systems can impart to make communication, commerce, and resources more accessible than ever to many more people. While finishing my Graduate degree, I started Cyphertech Security to help small businesses secure their data and digital communications and have a plan B for incident recovery. My studies and research include AI, cryptography, cloud, forensics, data security, and supply chain risk management. Besides my research and writing, I like to build useful VMs on the AWS platform or my ESXi hypervisor server, design networks, configure NGFWs, implement mesh VPNs for IP camera and LAN access, and much more.

When not in the office, I like to ride my Trek Émonda ALR I built a few years ago and pick a few tunes out on the acoustic guitar. I also love spending time with my wife and two babies, a seven-month-old deer-head chihuahua named Penny and her mom Mia.

Why subscribe?

My vision is to get people excited about things I am excited about: data security, successful configuration (the green check mark), and data backup. With this newsletter, I am devoted to sharing easy-to-understand content and various implementation projects anyone with a modest understanding of computers can complete for meaningful improvement. Guidance across the data security landscape is the newsletter's focus. While many enterprises have paid staff for this work, expect some overlap concerning personal digital security configurations. The application of tools is for the protection of data, whether that data resides on a firm's server, an individual's Network Attached Storage device or is in support of remote work or small home office use. So, even though personal digital security discovery often encompasses hobbling together a collection of YT videos with too many assumptions of underlying knowledge or missing critical details, this publication will make these topics much more understandable with practical examples.

Furthermore, company products or services featured in this newsletter and used for practice improvement of your digital security are evaluated based on experience, appropriate feature sets, and performance. Moreover, I am transparent in letting the reader know whether or not a service or application used is part of a sponsored review. While the newsletter focuses on helping you apply tools and techniques to enhance data security, if I happen to do a sponsored review, rest assured I have vetted the firm to ensure the organization meets customers where they are when attending to their needs. Having amazing products is one thing. Combining those unique products with customer investment across the value stream is the hallmark of great companies and ones I like to promote. So, if they're here, you can trust that they actively engage with their customers, demonstrating excellent value delivery while providing relevant high-performance products or services.

Finally, providing a high-value proposition concerning your information security practices takes considerable work and testing as I source various resources and lean on my many years of experience and technology-focused education to craft these publications. I want to convey a special thanks to all who find value in this content and subscribe, which significantly supports this work and which I sincerely appreciate. I would also like to ask those thinking about subscribing please consider it as the data you save today will be the data you need in the future. Good information security habits, awareness, and backups are core to your digital life, just like regular Doctor visits and healthy eating can be predictive and protective of your health. Subscribe today to my monthly newsletter and take charge of your digital hygiene!

Mia & Penny

Thanks for reading Bits, Bytes & Security! As a reader-supported publication, consider becoming a paid or free subscriber and support my work to receive new posts.

User's avatar

Subscribe to Bits, Bytes & Security

A monthly newsletter that keeps you up to date with the latest security practices and implementations to secure your personal data, click through to read first and then subscribe.

People

M.S., M.B.A., GCIH., N+