In a world of digital technology, it is easy to forget one sobering fact: our identity can be stolen from under our nose, with one click of the mouse, propelling us into nightmares in a matter of minutes, anytime, anywhere and on any one of our darling gadgets. Hackers, malware, botnets and all form of digital threats are ever more sophisticated, waiting in the shadows for that one opportunity to steal your sensitive information.
Terry Cutler, A Certified Ethical Hacker and international award winner reminds us of just how vulnerable our data really is, through chilling real-life stories, such as that of a simple USB key left purposefully behind, in any targeted enterprise’s lavatory, where an unsuspecting (albeit good-willed) employee can just pick it up, plug it in and thus, lead the hackers right into the company’s core data.
Terry’s training will teach you how to
Terry Cutler is a government-cleared cybersecurity expert (a certified ethical hacker), and the Director of Cybersecurity at SIRCO Investigation and Protection, in Montréal, Canada. He specializes in the anticipation, assessment, and prevention of security breaches for governments, corporations, businesses, and consumers, as well as Internet Safety for Children.
As an award-winning information security strategist for almost 20 years, Mr. Cutler has advised some of Canada’s largest companies on how to prevent and remedy internal and external security penetration. For the general public, he developed an effective online learning program arranged in modules and updated regularly to keep up with the rapidly changing digital landscape in which “wild-west” internet bandits constantly seek and find ways to break into our lives.
Terry Cutler is a frequent contributor to media reportage about cyber-crime, spying, security failures, internet scams, and the real social network dangers that families and individuals face every day.
Terry Cutler has coined the term Cyologist™ to describe what he does. His mission is to “help individuals and corporations protect themselves from data breaches and other online cyber threats through his videos, media appearances, coaching products and consulting services.”