Token Theft: keep the keys, skip the login.
Access tokens or refresh tokens, once stolen, let attackers act as you until they expire or are revoked.
Keep those doors locked, or I’ll be finding more than your house keys
Token Theft: keep the keys, skip the login.
Access tokens or refresh tokens, once stolen, let attackers act as you until they expire or are revoked.
Keep those doors locked, or I’ll be finding more than your house keys
You can always re-enter the day.
A rough morning doesn’t cancel your afternoon. Restart at any hour.
Keep breathing, keep going — you’re not alone in this.
You can always re-enter the day.
A rough morning doesn’t cancel your afternoon. Restart at any hour.
Keep breathing, keep going — you’re not alone in this.
Don’t plug in random USB drives.
They might carry malware. If you don’t know where it came from, don’t trust it.
Stay cyber safe and don’t be the one to make my job easier!
Don’t plug in random USB drives.
They might carry malware. If you don’t know where it came from, don’t trust it.
Stay cyber safe and don’t be the one to make my job easier!
Man-in-the-Middle: eavesdrop and edit in transit.
On insecure networks, attackers intercept traffic, reading or altering data between you and the site.
Keep those doors locked, or I’ll be finding more than your house keys
Man-in-the-Middle: eavesdrop and edit in transit.
On insecure networks, attackers intercept traffic, reading or altering data between you and the site.
Keep those doors locked, or I’ll be finding more than your house keys
I can break this cycle.
Patterns can change. One shift is the start of a different outcome.
Keep breathing, keep going — you’re not alone in this.
I can break this cycle.
Patterns can change. One shift is the start of a different outcome.
Keep breathing, keep going — you’re not alone in this.
Secure your printer.
Yes, printers can be hacked. Change defaults and update firmware.
Stay cyber safe and don’t be the one to make my job easier!
Secure your printer.
Yes, printers can be hacked. Change defaults and update firmware.
Stay cyber safe and don’t be the one to make my job easier!
UDP Flood: connectionless chaos.
High-volume UDP packets to random ports force the victim to keep checking and replying, wasting CPU and bandwidth.
Keep those doors locked, or I’ll be finding more than your house keys
UDP Flood: connectionless chaos.
High-volume UDP packets to random ports force the victim to keep checking and replying, wasting CPU and bandwidth.
Keep those doors locked, or I’ll be finding more than your house keys
Asking for help is a power move.
It’s not weakness. It’s resourcefulness: using tools, allies, and options.
Keep breathing, keep going — you’re not alone in this.
Asking for help is a power move.
It’s not weakness. It’s resourcefulness: using tools, allies, and options.
Keep breathing, keep going — you’re not alone in this.
Avoid public charging stations.
Juice jacking can steal data or install malware. Use your own charger or a USB data blocker.
Stay cyber safe and don’t be the one to make my job easier!
Avoid public charging stations.
Juice jacking can steal data or install malware. Use your own charger or a USB data blocker.
Stay cyber safe and don’t be the one to make my job easier!
Password Spraying: few guesses, many accounts.
Attackers try common passwords (e.g., Spring2025!) across tons of users to dodge lockouts and find a weak link.
Keep those doors locked, or I’ll be finding more than your house keys
Password Spraying: few guesses, many accounts.
Attackers try common passwords (e.g., Spring2025!) across tons of users to dodge lockouts and find a weak link.
Keep those doors locked, or I’ll be finding more than your house keys
You can set it down and pick it up later.
Pausing isn’t quitting. Rest the weight, then return stronger.
Keep breathing, keep going — you’re not alone in this.
You can set it down and pick it up later.
Pausing isn’t quitting. Rest the weight, then return stronger.
Keep breathing, keep going — you’re not alone in this.
Turn on 2FA wherever it’s offered.
That extra code is a speed bump that makes your account far harder to hijack.
Stay cyber safe and don’t be the one to make my job easier!
Turn on 2FA wherever it’s offered.
That extra code is a speed bump that makes your account far harder to hijack.
Stay cyber safe and don’t be the one to make my job easier!
MFA Fatigue: spam you into tapping ‘Approve.’
Attackers bombard your device with MFA prompts hoping you’ll accept one out of annoyance.
Keep those doors locked, or I’ll be finding more than your house keys
MFA Fatigue: spam you into tapping ‘Approve.’
Attackers bombard your device with MFA prompts hoping you’ll accept one out of annoyance.
Keep those doors locked, or I’ll be finding more than your house keys
Kindness costs me nothing, including toward myself.
Self-directed kindness has the same return as kindness outward. Use it freely.
Keep breathing, keep going — you’re not alone in this.
Kindness costs me nothing, including toward myself.
Self-directed kindness has the same return as kindness outward. Use it freely.
Keep breathing, keep going — you’re not alone in this.
Back up your important photos and files.
Hard drives die. Phones break. Cloud or offline backups save you from heartbreak.
Stay cyber safe and don’t be the one to make my job easier!
Back up your important photos and files.
Hard drives die. Phones break. Cloud or offline backups save you from heartbreak.
Stay cyber safe and don’t be the one to make my job easier!
Macro Malware: ‘enable content’ to enable chaos.
Booby-trapped Office files run scripts that fetch payloads or steal data once macros are allowed.
Keep those doors locked, or I’ll be finding more than your house keys
Macro Malware: ‘enable content’ to enable chaos.
Booby-trapped Office files run scripts that fetch payloads or steal data once macros are allowed.
Keep those doors locked, or I’ll be finding more than your house keys
Struggling doesn’t erase my strength — it proves it.
Effort under pressure shows your strength in action. Feeling it doesn’t mean you’re weak; it means you’re in the fight.
Keep breathing, keep going — you’re not alone in this.
Struggling doesn’t erase my strength — it proves it.
Effort under pressure shows your strength in action. Feeling it doesn’t mean you’re weak; it means you’re in the fight.
Keep breathing, keep going — you’re not alone in this.
Use a PIN or biometric lock on your phone.
Losing your phone is stressful. Don’t let it also expose your accounts and messages.
Stay cyber safe and don’t be the one to make my job easier!
Use a PIN or biometric lock on your phone.
Losing your phone is stressful. Don’t let it also expose your accounts and messages.
Stay cyber safe and don’t be the one to make my job easier!
Drive-By Download: visit, get infected.
Compromised or malicious sites exploit browser flaws to install malware without obvious prompts.
Keep those doors locked, or I’ll be finding more than your house keys
Drive-By Download: visit, get infected.
Compromised or malicious sites exploit browser flaws to install malware without obvious prompts.
Keep those doors locked, or I’ll be finding more than your house keys
Hunt for evidence, not assumptions.
When a thought hurts, test it. What’s fact, and what’s your brain guessing?
Keep breathing, keep going — you’re not alone in this.
Hunt for evidence, not assumptions.
When a thought hurts, test it. What’s fact, and what’s your brain guessing?
Keep breathing, keep going — you’re not alone in this.
Turn off Bluetooth when you’re not using it.
Open Bluetooth connections can be exploited to track or attack your device.
Stay cyber safe and don’t be the one to make my job easier!
Turn off Bluetooth when you’re not using it.
Open Bluetooth connections can be exploited to track or attack your device.
Stay cyber safe and don’t be the one to make my job easier!
Insecure Deserialization: poisoned objects, bad outcomes.
Untrusted serialized data gets processed and triggers arbitrary code or logic abuse.
Keep those doors locked, or I’ll be finding more than your house keys
Insecure Deserialization: poisoned objects, bad outcomes.
Untrusted serialized data gets processed and triggers arbitrary code or logic abuse.
Keep those doors locked, or I’ll be finding more than your house keys
Shame shrinks in daylight.
Speaking your truth to someone safe takes its power away. Secrecy feeds it; honesty starves it.
Keep breathing, keep going — you’re not alone in this.
Shame shrinks in daylight.
Speaking your truth to someone safe takes its power away. Secrecy feeds it; honesty starves it.
Keep breathing, keep going — you’re not alone in this.
Don’t click random ads or pop-ups.
Malvertising is real. Ads can install malware with one click.
Stay cyber safe and don’t be the one to make my job easier!
Don’t click random ads or pop-ups.
Malvertising is real. Ads can install malware with one click.
Stay cyber safe and don’t be the one to make my job easier!
QRishing: scan, land, and get scammed.
Malicious QR codes lead to fake sites that steal credentials or push shady apps. Verify before you scan.
Keep those doors locked, or I’ll be finding more than your house keys
QRishing: scan, land, and get scammed.
Malicious QR codes lead to fake sites that steal credentials or push shady apps. Verify before you scan.
Keep those doors locked, or I’ll be finding more than your house keys