About Us

 If the question above has pondered your mind in curiosity then rest  assured you’re not alone!  The name represents (2) well-known subject areas of technology involving ‘computers & electronics’ so I wanted something catchy to describe that in a broad sense. 

A) Cyber/IT (cybersecurity & information technology for the non-technical folks) and B) ‘Technology‘ Technology Cyber/IT’ continuously enjoy being part of and happen to be interesting and happen to be  

There’s no special way of saying this so I’ll just be upfront with you,  the name represents (2) distinctive interests of mine that I happen to  be extremely resourceful interests and traits that I saw in myself which have actually, question that I’m sure most are two words that describe my  interests which are, “Cyber & Tecky“. 

Urban Dictionary online defines the word, “Cyber” as a “computer network: cyberspace; and the word, “Tecky”  as a “Nickname pertaining to a person of advanced technological  knowledge and obsession. Someone who has the latest gadgets, and knows  how to solve technology errors”.  Those words in mind, you could summarize how I ended up with the coined name of “CyberTecky”! 

It is human nature to surround ourselves with things that are helpful and resourceful to us and technology is no stranger to that ideal match!  If you think about it, it’s almost unheard of for anyone to be seen ‘deviceless’ in today’s society  –  whether it be a smartphone, tablet, or PC,

they are all considered part of the technology era we live in today.


That being said, it would be insane for us to ignore the  fact that technology is integrating into our lives and we are all suckers for them because they are so resourceful!  The trick now is to find a balance between using technology as a resource and the security that it demands.


Due to high demand, manufacturers are pushing out the latest smartphones, tablets, and computers right into the consumers possession  at a remarkable rate.  Unfortunately, most of those devices are being  released with critical security flaws that if left unresolved could cause chaos for the consumer!

If you’re a “CyberTecky’ like me who makes a proactive effort to research, identify, and resolve potential security issues right away then you’ll most likely do just fine.  However, the majority of people have no idea where to start and unfortunately the fear of getting hacked or spied on becomes a lingering and uncertain thought in the back of our minds!

pexels-photo-5503716-5503716.jpg

Traditional risks such as computer viruses and worms can be detected and eradicated if handled in a reasonable time frame.  However, there’s a new wave of threats called, “Advance Persistent Threats”  (APT’s) that can become an all out battle, it all depends on the amount of time those attacks have to infiltrate.  Another common threat involves the human factor, where an attacker might use psychological manipulation and pressuring techniques known as social engineering to gain the advantage.  

The only way to combat those threats is through security awareness training, and policy compliance for companies.  Lastly and most hideously (in my opinion) are people who use cyber-bullying, blackmail,  and some extortion techniques to either hurt someone or force them into compliance.  Cyber-bullying has become more and more apparent these days and has been known to cause children and young adults to commit suicide which is terrible.  Cyber threats, regardless of the methods are a real  concern and having a CyberTecky to combat those threats can be  extremely important. 

pexels-photo-2046779-2046779.jpg

What’s something exciting I’m raising the ‘Red Flag’ because I took an “Code of Ethics” as a certified cybersecurity professional to utilize my training and skills to assist others in reducing their security risk footprint, preserving anonymity and privacy, and protecting sensitive data from loss, theft or misuse.

Your business offers? Say it here.

g9075f702d477a194e26e4e929e44668eddf5319606f8e95d76b7464ea528eecdfbf3cf866214847d6a47e4532f75731940a79bcc33d576f74dcaa80cbd5799a3_1280-2853046.jpg
g29fa2376b6ec98364c2e22f5068a448901b593b7ef706c0fed001a0d7ecbe3aa2925d08a4270e7d8bf3a09cca8f9c593f5fe1f28e792474a8ccde4f6abbab5cb_1280-2776600.jpg

Chad Jordan

Insert text HERE

Cely Jordan-Ponte

Insert text HERE mom

0
    0
    Your Cart
    Your cart is emptyReturn to Shop