As an information security professional with over 5 years of experience I have worked with several different security tools, which has given me a good understanding of what companies look for in their products and services. Additionally, I worked with hundreds of different employees and clients, from analyst level up to C-suite executives. From these experiences I’ve learned to communicate effectively to different audiences with varying levels of technical knowledge. From those experiences I’ve developed my own style of writing that focuses on these points:
Highlighting the pain-points that your product or service will fix for the user.
Use everyday language that all users can understand, except where it adds value to discuss technical details.
Create separate sections or articles for non-technical and technical audiences.
Put the most important points of your material first, there’s no guarantee people will read your material until the end.
“Pictures tell a thousands words”, always use diagrams or videos where possible to explain complex topics.
What do I deliver?
Case Studies
White papers
Blog posts
Corporate policy documents and playbooks
Training material
Advertisements for technical products, services and brands
Email Marketing Campaigns
Writing Samples


05 Sep
Microsoft Defender for Endpoint explained


06 Jun
Why your business needs cybersecurity consultants


02 Feb
Why do healthcare companies need cyber security?


21 Jan
Cybersecurity risks of connected devices in healthcare


12 Nov
How to be effective working from home


13 Oct
How to do digital marketing for a cybersecurity company


15 Sep
What is an Indicator of Compromise


08 Sep
Best VPNs for online privacy


25 Aug
What does a cyberattack do to a company’s value


12 Aug
How to write technical blog posts


10 Aug
Does Cybersecurity pay well


05 Aug
Best software tools for GitHub secrets detection


04 Aug
What is a CVE number


03 Aug
Growth Hacking for Cybersecurity Companies


29 Jul
Best website content for generating traffic


27 Jul
How to start a Cybersecurity Blog


21 Jul
How to write Cybersecurity blog posts


14 Jul
How to make sure file attachments don’t have a virus


07 Jul
CAPTCHA: How one test might determine if you’re a bot or not


23 Jun
Best wordpress security plugins in 2021


16 Jun
Top 10 interview tips for cybersecurity


04 Jun
Best Cybersecurity Bootcamps Toronto


02 Jun
What is a cookie on the Internet


28 May
Is Cybersecurity hard?


26 May
What is the Best and Cheapest Laptop for Gaming in 2021


19 May
Top Current Technology Trends That Your Business Can Benefit From


12 May
Six tips for Creating Secure Code


05 May
Best Cyber Threat Intelligence Sources 2021


29 Apr
Why you should start a cybersecurity career in the military


27 Apr
4 simple exercises for getting a better physique


22 Apr
Are Cybersecurity bootcamps worth it?


20 Apr
Best Cybersecurity Stock ETFs to invest in for 2021


15 Apr
Best Cybersecurity books for computer programmers in 2021


14 Apr
Best Cybersecurity books for startup founders in 2021


09 Apr
13 ways to make money from Cybersecurity in 2021


06 Apr
How to manage third party risk


01 Apr
How to write cybersecurity copy for your website in 2021


30 Mar
Freelancing as an Ethical Hacker


25 Mar
Top Certifications for an Ethical Hacker


23 Mar
How to Market Yourself as an Ethical Hacker


18 Mar
3 Best Learning techniques for Cybersecurity


16 Mar
9 ways to secure your startup in 2021


12 Mar
Is a Cybersecurity degree worth getting student loan debt


10 Mar
Best Places for learning Ethical Hacking


05 Mar
Concepts that need to be understood to be an effective hacker


03 Mar
How to calculate the ROI of Cybersecurity


26 Feb
Why practical experience is important for learning hacking


20 Feb
How is coding important for being a computer hacker


19 Feb
How does a professional hacker make money in information security?


13 Feb
Which is better Parrot OS or Kali Linux?


11 Feb
How to tell if a website is safe


09 Feb
9 steps for building a linkedin profile as a cybersecurity professional


06 Feb
How to market yourself for a cybersecurity career


05 Feb
What is a firewall?


04 Feb
What is blackberry spark?


03 Feb
Best cybersecurity stocks to buy in 2021


02 Feb
What does a data broker do?


30 Jan
Fourteen eyes surveillance alliance explained


28 Jan
Is cybersecurity a good career?



23 Jan
Information Security Content Writer for hire


23 Jan
Why are data backups important?


21 Jan
Will cybersecurity die?


16 Jan
Website Security Checklist 2021


14 Jan
What are the different types of IS audits in information security?


09 Jan
What is digital forensics in information security?


07 Jan
Active vs Passive Cyber Reconnaissance in Information Security


02 Jan
Best Resources for passing the CISA certification


31 Dec
Top 7 podcasts to follow in Information Security


29 Dec
Information Security Interview Questions for entry and mid level


26 Dec
What is the purpose of information security?


24 Dec
What are the 3 principles of Information Security?


22 Dec
What skills are needed for Cybersecurity?


19 Dec
What is Cybersecurity?


17 Dec
Can I teach myself Cyber Security?


15 Dec
Is C++ good for Cyber Security?


12 Dec
Top 7 Popular Cyber Threat Models


10 Dec
Does Cybersecurity require a lot of math?


08 Dec
Is Python Good for Cyber Security


05 Dec
What are the Top 5 most popular Cybercrimes


03 Dec
California Consumer Privacy Act (CCPA) Explained


01 Dec
Is Cybersecurity well paid?


28 Nov
What to do when your business gets hacked


28 Nov
System Hardening for Configuration Management


26 Nov
Why is Patching Software Important for Security


21 Nov
A Guide to Computer Malware


19 Nov
Why you are underpaid as a cybersecurity professional


14 Nov
How to Test your Business Continuity and Disaster Recovery Plan


12 Nov
A Guide to PIPEDA Compliance for Canadian Businesses


07 Nov
Business Continuity Planning for a Small Business


05 Nov
What is a Security Clearance and how do you qualify? (US and Canada)


04 Nov
Disaster Recovery Planning for Small Businesses


30 Oct
Types of Security Controls for a small business


28 Oct
SOX Compliance: Rules, Fines and Auditing


23 Oct
Home Security for elderly family members


21 Oct
A Journalist’s guide to online anonymity and secure communications


16 Oct
GDPR Compliance Explained


15 Oct
How to properly negotiate for a Pay Raise


14 Oct
What to do when you’re booted offline while gaming


14 Oct
Linux Academy Online Learning Platform Review


13 Oct
HIPAA Security Rule Explained


13 Oct
Introduction to HIPAA Compliance


13 Oct
Job vs Career: What’s the difference?


09 Oct
How to Handle Media during a Cybersecurity Breach


08 Oct
How to be PCI-DSS Compliant


07 Oct
How to stop DDOS while gaming


06 Oct
Intro to Home Security


02 Oct
How to Recruit Good Security Professionals


02 Oct
Security Tips for the Software Development Lifecycle


01 Oct
Why Your Business Needs Cyber Insurance


30 Sep
Tips for Email Security


26 Sep
How to keep your PSN account from getting hacked


25 Sep
Introduction to Corporate Investigations


23 Sep
How to Defend Against Insider Threats


18 Sep
Physical Security Best Practices


16 Sep
What is a SIEM?


11 Sep
What is a Bug Bounty Program?


09 Sep
How to Properly Negotiate your Salary in Tech


04 Sep
Top Resources for a CISO


04 Sep
How To Protect Your Startup Intellectual Property


02 Sep
Why you should use Password Managers


01 Sep
Top Cybersecurity Certifications


26 Aug
Authentication Methods for IAM


25 Aug
How to Create a Strong Password Policy


20 Aug
What is a Cybersecurity Framework?


13 Aug
15 Key Technologies for Securing your AWS Cloud Infrastructure


06 Aug
How to gain experience without a Job


27 Jul
Python Tutorial Part2 Pyautogui


22 Jul
Python Tutorial Part1 Regex


11 Jul
How to prepare for an entry level job interview?


11 Jul
Where can I learn to code?


08 Jul
Cybersecurity Hacking Epidemic


08 Jul
What impact does cybersecurity have on the economy?


01 Jul
Artificial Intelligence: Do robots pose a threat?


01 Jul
Bitcoin: The leader of Cryptocurrencies


01 Jul
Honeypots A Key to Network Reconnaissance


01 Jul
Virtual Inoculation: The New Digital Vaccine


01 Jul
What is Symmetric and Asymmetric Encryption?


01 Jul
What is Ransomware?


01 Jul
What is a Hacker?
SimpleProgrammer
Simple Programmer is focused on helping software developers, programmers and other IT professionals improve their careers and live better lives. I write articles that teach programmers how to write more secure applications and teach security professionals about programming topics that are relevant in the security industry.