Humans fail. We are not perfect.
September was a bit of a rollercoaster ride. October is better. I’ll do better.
Humans fail. We are not perfect.
September was a bit of a rollercoaster ride. October is better. I’ll do better.
Lately, I’ve been working on something that’s both personal and professional: changing my mindset from negative to positive. This is not easy, and I’m not perfect at all. I’m only in the awareness stage, and I’ve found the process frustrating.. daunting. I find it insane how often I’m negative and make statements that reflect the mindset.
Today, I’m writing this post to mark the beginning of my journey to change, and I plan to share monthly updates to track my progress and hopefully help others who might be on a similar path.
The first step in any change is recognizing the issue. From step 1 in alcoholics anonymous, to my journey here. Now, awareness is a journey of its own. You need to recognize the issue and then understand it. You need to realize when the issue is occurring and then understand why and how. While this seems simple enough, when something is hardwired in your brain… it feels natural, and you will struggle to see a problem, or THE problem.
I’ve enlisted a buddy to help me spot my negative actions, and here is the first thing I’ve noticed and become aware of. I don’t know when I am being negative. Period.
I’ve found that when something is difficult to recognize, it can be helpful to find patterns around what you are looking for. Patterns can be established that act like a homing beacon to a situation, and a lot of times those patterns can be the cause.
We’ve noticed my pattern: I tend to slip into negativity when I’m trying to be funny or break tension in a conversation. Humor is a coping mechanism, but sometimes it leans too far into sarcasm or pessimism. Now, I’m learning to pause and ask myself, “Is this helping or hurting the tone?”
Awareness is key to a change. You can’t change something you aren’t aware of or know of its existence. In this regard, the change has already started.
I’ve started journaling daily using a positivity-focused journal with prompts designed to shift my mindset. The idea is to first document my thoughts, focusing on mindset and events. I can then review the entries to try and find triggers and changes, also to reflect on the journey I’ve been through and will continue.
First and foremost, journaling increases self-awareness. Again, looking for triggers and pressure points, then self-reflecting on how to deal or remove these situations in the future. Today, I will write about a situation with my business partner where she was incredible unhappy with my responses to questions… somewhat accusational about me trying to be funny in a serious situation. It wasn’t welcome, however previous revelations show that I have a tendency to do this, and also defending the response is unnecessary. In this situation, positivity wasn’t working, but negativity is just annoying, so perhaps silence is best… and you know what, it worked.
Journaling is going to help in the long-run with Step 4: Practicing Reframing. Reflecting on the events, we can ask “how can I do this differently?” and from there, grow. Growth is a very important cornerstone of positivity, and a “growth mindset” is incredibly important in life. Reference “Mindset: The New Psychology of Success” by Carol S. Dweck.
I think the most important reason for journaling is a documented trail of success. I will be able to look back at the journey and think, “I did that, I changed that, look where I’ve been and where I’m going.” This feeling of success keeps humans moving, and changes outlooks of feeling stuck or in a rut into feelings of I’ve got this, I’ve been there, I’m on my way.
A first self-reflection here: I tried journaling at night, but I struggled to keep the habit—so I’ve moved journaling to the morning. We’ll see if this is a better fit for my routine and helps set a positive tone for the day.
Here we are. Why am I writing this post?
This blog is part of my accountability. The goal is to post once a month to reflect on what’s working, what’s not, and how I’m growing. Writing publicly adds a layer of commitment and gives me a space to share insights and struggles.
The benefit for you? You will see in real time what I’m going through, doing, struggling, and succeeding with.
This is a public journal of sorts. And maybe, just maybe, you’ll find it helpful as well.
Reframing is a powerful tool. Instead of saying, “This is overwhelming,” I’m learning to say, “This is challenging and exciting.” It’s a subtle shift, but it changes how I approach problems and opportunities.
I’m experimenting with listing three good things that happened each day. Since I journal in the morning, this can be tricky—but growth means finding what works. Maybe I’ll revisit nighttime journaling later, or find another way to reflect on the day’s positives.
This one’s tough. Positivity is contagious, but so is negativity—and right now, my office leans toward the latter. I’m curious: is this common in IT environments? If so, how do we shift the culture? I don’t have answers yet, but I’m asking the questions.
I’ve set two achievable goals:
These are small but meaningful steps toward building consistency and self-discipline.
I haven’t started this yet, but here’s the plan:
This is a big one. Social media, news, even certain conversations can drag me down. I’m working on setting boundaries and being intentional about what I consume. It’s hard in today’s world, but necessary.
This journey isn’t about perfection—it’s about progress. I’m learning, adjusting, and staying open to change. If you’re working on your mindset too, I’d love to hear what’s helping you. Let’s grow together.
Have you ever got a scary “left behind” alert from your AirTag mid-flight? You’re not alone. AirTags are fantastic little trackers for luggage, but if you don’t understand how they work, they can give you a real shock at 30,000 feet! In this post, we’ll explain how Apple AirTags track your stuff, like checked bags on a plane, how they can sometimes falsely report that your luggage is missing, and how to avoid unnecessary confusion on your next trip.
An Apple AirTag is a tiny Bluetooth tracking device about the size of a coin. You attach it to items you don’t want to lose—keys, wallets, and yes, your luggage. Once it’s set up with your iPhone, you can see the AirTag’s location in the Find My app on your phone or iPad. AirTags do not have built-in GPS or cellular data themselves; instead, they use a clever method to help you locate things.
An AirTag like a little beacon shouting “Here I am!” via Bluetooth. It’s constantly sending out a Bluetooth signal. Now, whose devices pick up that signal? Any nearby Apple device, like an iPhone, iPad, Mac, that’s connected to the internet can detect an AirTag if it is within Bluetooth range. Those devices then do the helpful thing of relaying the AirTag’s location to Apple’s cloud, the Find My network. Effectively, your AirTag piggybacks on strangers’ iPhones, or your own devices, to report where it is.
The points to remember are:
AirTags work kind of like having a crowd of digital messengers around the world. But even messengers can’t help if they’re stuck with no signal.
Many travelers love popping an AirTag into checked luggage. It’s a nice peace of mind booster to see that your suitcase made it on the plane, or is at least at the same airport you are. In fact, AirTags have become super popular for tracking bags since they launched in 2021. Airlines usually don’t mind them, and they’re small and have long battery life.
Advantages of AirTags in travel:
However, using AirTags on flights isn’t 100% real-time magic. Which brings us to…
Imagine this: You’re settling into your flight, maybe buckling up, when your phone buzzes with an alert from the Find My app: “Your luggage was left behind” at the departure airport. 😱 Talk about a panic moment! Does this mean your bag is literally not on the plane?
This exact scare happened to a traveler recently. A man named Will was on a flight out of a small airport in South Africa when a notification popped up on his Apple Watch saying his suitcase had been “left behind.” He later shared that he “worried the ENTIRE flight” thinking his bag was lost.
So, what was going on? Short answer: The AirTag in his suitcase wasn’t able to update its location during the flight, so it still showed the last known spot (the departure gate) which triggered a false alarm.
Here’s why these misleading “left behind” alerts can happen on a plane:
In Will’s story, it turned out to be a non-issue: the bag was safely on the plane all along. As soon as they landed and he got connectivity, the AirTag updated its location, and he even saw the suitcase being unloaded from the plane. The alert was effectively a glitch or misunderstanding—the AirTag wasn’t actually failing, it was doing exactly what it’s designed to do (report the last location it could connect).
The key lesson here is that AirTags aren’t real-time GPS trackers with satellite phones; they rely on nearby devices. If you get a scary alert, take a deep breath and consider context:
To make the most of AirTags and avoid confusion, here are a few casual tips:
AirTags are awesome for keeping track of your stuff – especially luggage – but they have limits. They need to hitch a ride on nearby internet-connected devices (like iPhones and iPads) to let you know where they are. On an airplane or other dead zones, they might go quiet for a while and spook you with outdated info. Now that you know how AirTags work, you won’t be fooled by a momentary gap in coverage.
Next time you fly, you can enjoy that in-flight movie without obsessively refreshing your luggage tracker. ✈️ Your AirTag will phone home when it can – and if it doesn’t, you’ll know when to actually start worrying. Until then, sit back, relax, and know that no news is probably good news when it comes to your tracked bag! Safe travels!
You receive a call from the IRS. They claim you haven’t paid you back taxes and a warrant for your arrest is going to be issued unless you make a payment immediately, which the caller can take for you. The back taxes are some affordable number for you, and to prevent problems, you think “I should pay this.”
Don’t.
First, and this will be a reoccurring theme, large corporations or organizations don’t call you. The IRS still uses good ol’ USPS snail mail. If they have an issue, you’ll receive a letter. And oh by the way, the IRS isn’t fast. There is no “Pay now!” They set deadlines, sure, but it usually months away. If you are about to be arrested for back taxes… you most likely will know, because it will be in the millions.
Fake calls are a plague of a scam that has been ongoing since the invention of the telephone. Yet, people still fall for them, every day.
If you receive a call from someone claiming to be from an agency or corporation and you should “act now”, ask for information from them before answering any of their questions. What is this charge for? Who authorized it? What payment method was used? Cancel my service!
These can throw a scammer off their script, or cause them to scramble a bit that will give you a clue that the claim is fraud.
Also, be aware of scams that nobody has to talk to you. We all know of the “Yes” scam, where the caller asks a simple questions and is able to record your voice saying Yes to then use to charge something. Did you know about the one ring scam? It’s a thing, and the FCC even has their own article about it here!
There are a lot of useful things on the internet, software is a big one. The development of a piece of software is time consuming, and costly. No body is going to give it away completely for free.
Free software can do any number of things, including giving an attacker direct and unfiltered access to your computer, passwords, anything saved on there. Remember, if the software/service is free, you are the product. They are either stealing something, or selling your data to someone else.
Watch for software or services that claim to be free or unusually cheap. If you are signing up for something, the fine print may enroll you into cost subscriptions, so be very aware of where you enter your credit card information. Websites and ad’s can be posted on real websites like Instagram or Facebook. Verify everything yourself!
I will always say one thing to my IT clients, “Big tech companies do not call you.”
Microsoft, for instance, does not call end users. Microsoft does not monitor the 1.5 billion devices running software made by them for threats. Microsoft does not remediate viruses.
Apple neither.
Any unsolicited call you receive claiming to remediate your tech problems immediately is a scam. Even if your are in the middle of a security incident, such as a ransomware attack, these calls are from the attacker, and the decision to pay them is mired in many details, ethical questions, and business decisions. You definitely should not just had over bank or credit card details.
Find a local IT Managed Service Provider, such as St. Aubin Technologies, Inc. in Homestead, Florida. By making contact yourself, you are already answering your own questions about the legitimacy of the IT company.
If you are a business owner, you need to have a standing relationship with an IT company in general. You don’t go to court yourself. You don’t just start laying bricks for a building yourself. You need professionals, because the time, money, and mental health savings add up quickly. That said:
If you have a standing relationship with an IT company, call them. They have procedures in place to start protecting you immediately. They will take control of the situation and start you back to recovery.
Remember, if you fell for a scam, this is akin to having a car accident of sorts. Some are minor, some are bad. Your path to recovery can be simple, or difficult. A IT professional will help a lot in both… but it’s always best not to have one.
Train your brain to recognize scams. Security Awareness Training for you and your employees is a must. Microsoft Defender has it’s own, as well as company’s like Ninjio and KnowBe4 (not partners… yet). Just like watching your money and markets, security is a journey and you must continue walking the path to keep up.
Again, and I can’t say this enough, get a relationship with an IT Professional. Email me, I can help you find one.
It’s all fun and games until someone lets a hacker in.
This week a Cisco employee unknowingly let an attacker into one of Cisco’s CRM systems. It was accomplished by a Vishing attack, or a voice scam, usually a phone call. The user was persuaded to give up enough information to allow the attacker access to the CRM, and a data set of client information was downloaded before the Cisco security team was able to terminate access.
Cisco Hacked – Attackers Stolen Profile Details of users Registered on Cisco.com
There are many lessons here.
Any employee, vendor, family member with access can unknowingly allow an attack. It is important to know and accept this. The best defense is an offense. Teach your people, your family, to recognize threats or don’t offer anything up. Hold your vendors to the same level you do yourself. If they refuse, maybe it’s not worth the relationship.
Cisco is a world-renown technology vendor with a strong presence in cyber security. As a cyber security professional, I routinely use one of Cisco’s news sites to keep up with the latest threats and technologies. Cisco Talos Intelligence Group – Comprehensive Threat Intelligence. This employee was probably undergoing constant security awareness training by Cisco and was not someone without credentials to be in a capacity with access.
If I had to guess, it was a quick lapse in judgement that allowed the attack, and that quick lapse is completely human.
Cisco is a large company, with its own internal security teams. They do a very good job of protecting their company, their products, and their customers. It still happened.
I cannot iterate this enough. Cyber security’s weakest member, humans, can be its strongest. If a user allows an attacker in, all the systems in the world couldn’t stop the initial damage… it is damage control from that point forward. However, if the user recognizes the threat and hangs up… attack over, no damage. Crazy, I know!
Train your people. End of story, and threat.
A leak of information is so important in the modern internet, no breach is too little to note. A breach is a breach, and the information within can and will be linked to more information and used to catch bigger fish.
A fisher man first lures bait fish to a trap or net. He catches the bait fish and puts them on a hook to catch a bigger fish. If he want’s larger than that, like a shark, he hooks the larger fish and continues until he gets what he wants. The really, really, really big fish. The really big fish is the target, but get this, none of the little fish survive either. They are eaten, hooked, dragged through the water looking for the big fish. No fish wins this story.
How do I sum up a service that has the power to completely run your business?
I guess I don’t.
Microsoft 365, aka Office 365, is a powerful tool that Microsoft has placed within just about everything Microsoft does. Everything.
AI will tell you, “Microsoft 365 is a subscription service that provides blah, bla, blah, blah, bla.” Not exactly summing it up. Probably because there is too much to sum. So:
Microsoft 365 does email. It integrates seamlessly into Microsoft Outlook to bring you a synchronized experience across all your devices. PC, Android, iPhone, Mac, whatever.
OneDrive and SharePoint. These tools help you synchronize your files across all your devices. PC, An… yeah you get it. They also allow you to work together with others on the same files… remotely!
Teams is a productivity app that connects teams, whether they are remote or in the office. Teams includes instant message, phone calls, file storage (based on SharePoint), and integrates with many, many more apps.
Windows as a Service. For a monthly subscription, you have a Windows virtual machine that you can connect to from anywhere, and have all your files, desktop settings, etc. in one place… anywhere.
CoPilot is Microsofts AI (or Large Language Model). CoPilot can search the web, but it can also be limited to company procedures and existing data for it’s research. Best yet, with the paid version, your data stays within your company.
There is ton’s more inside Microsoft 365. Security, device management, Azure, etc. But for the most part, these are the services most small businesses use, and grow into the rest!
In the modern workplace, convenience is king. Quick access to resources, seamless sharing of information, and the integration of technology into daily processes all help drive productivity. Among the many tools that have become commonplace is the QR code—a simple, scannable square that can lead to websites, download forms, and much more with a simple click of your smartphone camera. But with this convenience comes a new form of cyber threat: quishing.
Quishing, or QR code phishing, is a rising concern for both individuals and businesses. As QR codes become embedded in everything from office posters to conference sign-ins and restaurant menus, understanding how to use them safely is essential. In this article, we’ll explain what quishing is, how to spot and prevent it, and what steps to take if you’ve accidentally scanned a malicious QR code.
Quishing is a cyberattack technique where threat actors use QR codes as a vehicle for phishing. Just as traditional phishing tricks users into clicking deceptive links in emails or texts, quishing relies on the unsuspecting scanning of QR codes that redirect victims to fraudulent websites or trigger harmful downloads.
A typical quishing attack might involve a hacker replacing a legitimate QR code with their own, which could:
Because QR codes are just images, it’s impossible to discern their destination by looking at them. This makes them a powerful tool for cybercriminals hoping to bypass your defenses.
For business users, quishing poses several unique risks:
While QR codes themselves don’t reveal much, there are practical steps you can take to spot and avoid quishing threats:
Prevention starts with awareness and a few key habits:
Mistakes happen, and even vigilant users can slip up. If you think you might have scanned a malicious QR code, take these steps immediately:
It’s easy to underestimate how convincing quishing attempts can be. For example, imagine attending a business conference where the event program includes a QR code for the Wi-Fi login. Without knowing it, someone has placed a counterfeit sticker over the original code—scanning it directs you to a site that asks for your work email and password. In the hustle of the event, you might not notice the subtle difference in the URL.
Or consider receiving an email from what appears to be “IT Support” with a QR code to verify your account security. While this seems legitimate, it’s a common phishing ploy—one that could compromise your credentials in seconds.
Quishing is a sophisticated twist on familiar phishing tactics, and as QR codes continue to gain traction in both business and daily life, it’s crucial to remain vigilant. While you don’t need to stop using QR codes altogether, a healthy dose of skepticism and adherence to best practices can protect you, your colleagues, and your organization from unnecessary risk.
Remember: Just as you would think twice before clicking a suspicious email link, give QR codes the same critical eye. By staying informed and cautious, you can enjoy the benefits of QR technology—without falling prey to digital traps.