Tony DeGonia

Consultant - Cyber, Cloud, Networking and Physical

Highly proficient, knowledgeable and motivated Sales Engineer with a successful track record of sales success across 2 decades. Motivated professional who excels at delivering quality service while exceeding revenue benchmarks on a consistent basis. Well versed in multiple security domains including, cyber, cloud, networking and physical (IP/CCTV). Equally comfortable installing and deploying cutting edge technology, negotiating sales contracts from SMB to Large Enterprise or speaking/training on an advanced technology subjects to an audience of 400 or more. I am available for immediate employment either via W2 or 1099. If you are a client and would like to contract my services as a consultant please contact me via email or telephone and we can discuss the issues and my rates at that time. Thank you for visiting my website.

How long until I am working again?

I was laid off on -February 12, 2018
69 days ago.

Years of Sales Engineering Experience

Years of Sales/Business Experience

Years Hands-on Technical Experience

CyberSimplified Podcast Series – The Delta Hack of 2017

It's almost here -April 23, 2018
2 days to go.

Check Out My Latest Podcast

11. For I know the plans I have for you,” declares the Lord, “plans to prosper you and not to harm you, plans to give you hope and a future. 12. Then you will call on me and come and pray to me, and I will listen to you. 13. You will seek me and find me when you seek me with all your heart.

Jeremiah 29:11 New International Version (NIV)

Contact Information

469 969 9422 (Cell)
Available anytime via email or cellphone.

CompTIA Sec+ - Course Complete

100%

Cyber Security Proficiency

%

Cloud Services Proficiency

%

Networking Proficiency

%

Physical Security Proficiency

%

Security Agency (Council) of the Month

PROMOTING PARTNERSHIP IN TRANSPORTATION SECURITY

The Southwest Transportation Security Council (SWTSC) was formed to promote a partnership among Transportation Security Management groups and law enforcement to enhance communication and cooperation with a focus on transportation security and cargo theft in Texas and the Southwest area of the United States. Also to provide education to Law Enforcement Agencies and Officers about the transportation industry through partnership with the North Texas Crime Commission locally and to nationally partner with other transportation regional security industry councils and the Supply Chain – Information Sharing and Analysis Center to provide critical information and assistance to all members.

Please browse our site and learn how the transportation private sector and law enforcement have joined together in the Southwest Region of the United States to fight cargo crime and transportation security issues through education, information sharing and partnership.

You can find us at http://www.swtsc.com or via mail at the address below:

  • Southwest Transportation Security Council
  • 5501 LBJ Freeway, Suite 800
  • Dallas, TX 75240

 

 

 

 

 

 

Articles

I write and curate articles for this site that I think may be helpful, educational and even some that are original works. I am also a publish author of a number of articles on different technology subjects, not just through my own website but through nationally know channels as well. I have also been quoted for numerous articles as a subject matter expert in the fields of Managed Services and Cloud Services.

The Target Breach – Demystified

In December 2013 over 40 million credit cards were stolen from nearly 2000 Target stores by accessing data on point of sale (POS) systems. This paper will explore known issues in the Target reach and consider some of the Critical Controls that could have been used to both prevent this breach and mitigate losses.

(Image: Ronnie Chua via Shutterstock)

The 6 Riskiest Social Media Habits to Avoid at Work

Kelly Sheridan Slideshows – Connect Directly Cybercriminals are turning to Facebook, Twitter and other platforms to launch attacks via employee behavior that could be putting your business at risk. Oversharing sensitive information Most people don’t think twice about the personal information they make publicly available. Social media accounts are “a treasure trove” of birthdates, education histories, […]

Stuxnet

Stuxnet Name Origin The original name given by VirusBlokAda was “Rootkit.Tmphider”; Symantec however called it “W32.Temphid”, later changing to “W32.Stuxnet“. Its current nameis derived from a combination of some keywords in the software (“.stub” and “mrxnet.sys”). What is a Zero Day attack? A zero–day exploit is an attack that exploits a previously unknown security vulnerability. A zero–day attack is also sometimes defined as an attack that […]

IndigoVision Releases The Latest Version Of Their Security Management Solution

IndigoVision announces a product release that allows users to maximize their security systems potential. This release includes the latest version of their Security Management Solution Control Center, a new cyber-security innovation CyberVigilant® in Camera, the Integra™ all in one device, and three additional products which strengthen their existing security offering. IndigoVision’s Control Center has long been regarded in the industry […]

Small Business Guide and Infographics PDF Downloads

    Cyber Security: Small Business Guide (PDF Version) NCSC Glossary Cyber Security: Small Business Guide (Infographic) A summary of low cost, simple techniques that can improve cyber security within your organisation. This advice has been produced to help small businesses protect themselves from the most common cyber attacks. The 5 topics covered are easy […]

Avoiding phishing attacks

Steps to help you identify the most common phishing attacks. In a typical phishing attack, scammers send fake emails to thousands of people, asking for sensitive information (such as bank details), or containing links to bad websites. They might try to trick you into sending money, steal your details to sell on, or they may […]

Using passwords to protect your data

5 things to keep in mind when using passwords. Your laptops, computers, tablets and smartphones will contain a lot of your own business-critical data, the personal information of your customers, and also details of the online accounts that you access. It is essential that this data is available to you, but not available to unauthorised […]

Keeping your smartphones (and tablets) safe

5 quick tips that can help keep your mobile devices (and the information stored on them) secure. Mobile technology is now an essential part of modern business, with more of our data being stored on tablets and smartphones. What’s more, these devices are now as powerful as traditional computers, and because they often leave the […]

Protecting your organization from malware

5 free and easy-to-implement tips that can help prevent malware damaging your organisation. Malicious software (also known as ‘malware’) is software or web content that can harm your organisation, such as the recent WannaCry outbreak. The most well-known form of malware is viruses, which are self-copying programs that infect legitimate software. This section contains 5 free […]

Backing up your data

5 things to consider when backing up your data. Think about how much you rely on your business-critical data, such as customer details, quotes, orders, and payment details. Now imagine how long you would be able to operate without them. All businesses, regardless of size, should take regular backups of their important data, and make sure […]

What to Know About the Latest Data Breach Hitting Sears and Delta Customers

Both Sears and Delta Air Lines are facing the exposure of some of their customers’ credit card information, following a data breach at a mutual contractor. The company, a customer services operation called [24]7.ai, suffered the breach between Sept. 26 and Oct. 12 last year. It said in a statement that the incident “potentially [affected] […]

Necurs is Back, Just in Time for Easter

After a drastic decline in the volume of spam coming from the Necurs spambot observed by Check Point Telemetry in the past month, the infamous botnet is back once again and is spreading QuantLoader. Necurs, considered to be the world’s largest botnet, was used to distribute several malware families in the past, such as the […]

I Made It to Spotify... My Podcasts are listed

Member of The Internet Defense League

Sign up Today for updates to our website and podcast series.