-
The Risks of Publicly Posting Your Email: A Firsthand Experience
Well, it finally happened. I posted my email address on my website, and within four days, it was picked up by web crawlers (spiders) and added to an email tracking list. This experience reinforced just how quickly email harvesting bots can collect and distribute publicly available addresses, inevitably leading to an influx of spam, phishing…
-
The Overlooked Importance of Cybersecurity Vulnerability Testing
Vulnerability testing is one of the most underrated aspects of cybersecurity. Too often, organizations treat it as a compliance checkbox rather than a proactive security measure. In my previous role, I was responsible for running periodic vulnerability reports and patching software vulnerabilities. While this process provided critical insights into potential security risks, many clients approached…
-
The Importance of Personal Cybersecurity: My Experience with Social Engineering
Cybersecurity is not just a concern for businesses and IT professionals—it is an essential aspect of personal security as well. One of the key measures I take to protect myself is using ESET for endpoint protection, primarily because it supports both computers and mobile devices. Mobile security is crucial, as social engineering attacks increasingly target…
-
Securing and Hosting My Website with Cloudflare and Microsoft 365
Ensuring the security and reliability of an online presence is critical in today’s digital landscape. For my website infrastructure, I have implemented a robust approach that combines Cloudflare for domain security and DNS management, WordPress for content management, and Microsoft 365 for email hosting. Additionally, I have enforced strict access controls through Intune and Conditional…
-
Deploying DeepSeek R1 on a Self-Hosted Instance
As part of my ongoing efforts to explore and implement self-hosted AI solutions, I recently deployed DeepSeek’s latest AI model, R1, on a virtualized environment within my infrastructure. This process involved several key steps, from provisioning hardware resources to configuring the AI host and testing its performance. Setting Up the Virtual Machine To begin, I…