About.

Tony DeGonia

Solutions Architect | Cyber Security | Cloud Services
Highly Experienced Sales Engineer/Solution Architect seeking a new role to focus 100% effort on creating solutions that bring value to an appreciative employer and customer.

Contact Information

469 969 9422 (Cell)
Available anytime via email or cellphone.

12 I know what it is to be in need, and I know what it is to have plenty. I have learned the secret of being content in any and every situation, whether well fed or hungry, whether living in plenty or in want. 13 I can do all this through him who gives me strength.

- Philipians 4:12-13

Articles

Don’t Lose Your Tax Return to Hacker Emails

April 13, 2017 By The Editor @ Secplicity.org Be on the lookout for fake IRS emails as tax season comes to a close. Phishers pretending to be from the IRS are flooding the internet. Last year the IRS saw a 400 percent increase in phishing and malware incidents in the first part of tax season, compared […]

Why one Republican voted to kill privacy rules: “Nobody has to use the Internet”

JON BRODKIN – 4/14/2017, 3:03 PM Republicans encounter angry citizens after killing online privacy rules. A Republican lawmaker who voted to eliminate Internet privacy rules said, “Nobody’s got to use the Internet” when asked why ISPs should be able to use and share their customers’ Web browsing history for advertising purposes. FURTHER READING How ISPs […]

Market Yourself! Building a Personal Brand for the Information Age

Avantika Monnappa – Published on Dec 31, 2015 If a company is successful, it means branding has played a major role. When a company’s identity is packaged and presented in a way that is familiar, pleasing, and attractive – it attracts its recurring and prospective customers – and that’s what company branding is all about.Organizations and […]

Why You Should Not Use Smartphone Fingerprint Readers

Joseph Steinberg – Published on February 4, 2016 While many smartphones today come with fingerprint readers, people should exercise caution in relying on these features – especially when security is important. Here are several reasons why: Your fingerprints are all likely all over your phone. You do hold it with your hands, right? How hard […]

5 Reasons SMBs Need MSSPs in 2017

Himanshu Verma –  March 6, 2017 For small and midsize businesses (SMBs), information security should be an “enterprise-grade” concern. Unfortunately, many SMBs believe they are not big enough to be targeted by cyber attackers. To the contrary, well-publicized breaches sustained by SMBs have shown that the threat is real, regardless of their industry or size. […]

STEM Girls Have Swagger

Barrett Sellers on April 10, 2017. Boys can play with dolls – GASP! It won’t turn them into a… GIRL. And, girls can play with code and strive for meaningful careers in cybersecurity without fearing that they will be seen as inferior. Yes, ladies… please stand up! The 2017 Global Information Security Workforce Study: Women […]

Beware of an Unpatched Microsoft Word 0-Day Flaw being Exploited in the Wild

Sunday, April 09, 2017 Swati Khandelwal It’s 2017, and opening a simple MS Word file could compromise your system. Security researchers are warning of a new in-the-wild attack that silently installs malware on fully-patched computers by exploiting a serious — and yet unpatched — zero-day vulnerability in all current versions of Microsoft Office on fully-patched […]

Credit: Shutterstock

Hack of Dallas emergency sirens prompts more warnings to bolster cybersecurity

By Matt Hamblen  –  Senior Editor, Computerworld | APR 10, 2017 9:39 AM PT Sirens blared for 90 minutes early Saturday Dallas emergency management officials continue to investigate a hack that activated all 156 emergency tornado sirens citywide for about 90 minutes early Saturday. The city declared the sirens were activated Friday night in a […]

20 Interview Questions and Answers for Cyber-security Professionals

Scott Barman Published on November 8, 2016 Interviewing and hiring cybersecurity professionals can be more difficult than other types of technology professionals. Unless the hire is for a specific skill, like configuring routers or other appliances, a successful cybersecurity professional has to understand a wide variety of technology, be intellectually curious, and trustworthy. As someone […]

Guest Wifi Setup Vol 1

Here is a video showing us how to set up the guest wifi setup for WatchGuard Wireless products. Check it out and I hope it helps out. Thanks for Michael Pearson, WatchGuard Sales Engineer.

3 months more…

So I have now hit the 3 month mark on my “pursuit of fame and riches”, aka, gainful employment. I will tell you that this not the first time I have been laid off but this one has definitely required the most effort to find gainful employment. I have had several interview via the phone […]

Video of the Month