As an information security professional with over 5 years of experience I have worked with several different security tools, which has given me a good understanding of what companies look for in their products and services. Additionally, I worked with hundreds of different employees and clients, from analyst level up to C-suite executives. From these experiences I’ve learned to communicate effectively to different audiences with varying levels of technical knowledge. From those experiences I’ve developed my own style of writing that focuses on these points:
Highlighting the pain-points that your product or service will fix for the user.
Use everyday language that all users can understand, except where it adds value to discuss technical details.
Create separate sections or articles for non-technical and technical audiences.
Put the most important points of your material first, there’s no guarantee people will read your material until the end.
“Pictures tell a thousands words”, always use diagrams or videos where possible to explain complex topics.
What do I deliver?
Case Studies
White papers
Blog posts
Corporate policy documents and playbooks
Training material
Advertisements for technical products, services and brands
Email Marketing Campaigns
Writing Samples

05 Sep
Microsoft Defender for Endpoint explained

06 Jun
Why your business needs cybersecurity consultants

02 Feb
Why do healthcare companies need cyber security?

21 Jan
Cybersecurity risks of connected devices in healthcare

12 Nov
How to be effective working from home

13 Oct
How to do digital marketing for a cybersecurity company

15 Sep
What is an Indicator of Compromise

08 Sep
Best VPNs for online privacy

25 Aug
What does a cyberattack do to a company’s value

12 Aug
How to write technical blog posts

10 Aug
Does Cybersecurity pay well

05 Aug
Best software tools for GitHub secrets detection

04 Aug
What is a CVE number

03 Aug
Growth Hacking for Cybersecurity Companies

29 Jul
Best website content for generating traffic

27 Jul
How to start a Cybersecurity Blog

21 Jul
How to write Cybersecurity blog posts

14 Jul
How to make sure file attachments don’t have a virus

07 Jul
CAPTCHA: How one test might determine if you’re a bot or not

23 Jun
Best wordpress security plugins in 2021

16 Jun
Top 10 interview tips for cybersecurity

04 Jun
Best Cybersecurity Bootcamps Toronto

02 Jun
What is a cookie on the Internet

28 May
Is Cybersecurity hard?

26 May
What is the Best and Cheapest Laptop for Gaming in 2021

19 May
Top Current Technology Trends That Your Business Can Benefit From

12 May
Six tips for Creating Secure Code

05 May
Best Cyber Threat Intelligence Sources 2021

29 Apr
Why you should start a cybersecurity career in the military

27 Apr
4 simple exercises for getting a better physique

22 Apr
Are Cybersecurity bootcamps worth it?

20 Apr
Best Cybersecurity Stock ETFs to invest in for 2021

15 Apr
Best Cybersecurity books for computer programmers in 2021

14 Apr
Best Cybersecurity books for startup founders in 2021

09 Apr
13 ways to make money from Cybersecurity in 2021

06 Apr
How to manage third party risk

01 Apr
How to write cybersecurity copy for your website in 2021

30 Mar
Freelancing as an Ethical Hacker

25 Mar
Top Certifications for an Ethical Hacker

23 Mar
How to Market Yourself as an Ethical Hacker

18 Mar
3 Best Learning techniques for Cybersecurity

16 Mar
9 ways to secure your startup in 2021

12 Mar
Is a Cybersecurity degree worth getting student loan debt

10 Mar
Best Places for learning Ethical Hacking

05 Mar
Concepts that need to be understood to be an effective hacker

03 Mar
How to calculate the ROI of Cybersecurity

26 Feb
Why practical experience is important for learning hacking

20 Feb
How is coding important for being a computer hacker

19 Feb
How does a professional hacker make money in information security?

13 Feb
Which is better Parrot OS or Kali Linux?

11 Feb
How to tell if a website is safe

09 Feb
9 steps for building a linkedin profile as a cybersecurity professional

06 Feb
How to market yourself for a cybersecurity career

05 Feb
What is a firewall?

04 Feb
What is blackberry spark?

03 Feb
Best cybersecurity stocks to buy in 2021

02 Feb
What does a data broker do?

30 Jan
Fourteen eyes surveillance alliance explained

28 Jan
Is cybersecurity a good career?

23 Jan
Information Security Content Writer for hire

23 Jan
Why are data backups important?

21 Jan
Will cybersecurity die?

16 Jan
Website Security Checklist 2021

14 Jan
What are the different types of IS audits in information security?

09 Jan
What is digital forensics in information security?

07 Jan
Active vs Passive Cyber Reconnaissance in Information Security

02 Jan
Best Resources for passing the CISA certification

31 Dec
Top 7 podcasts to follow in Information Security

29 Dec
Information Security Interview Questions for entry and mid level

26 Dec
What is the purpose of information security?

24 Dec
What are the 3 principles of Information Security?

22 Dec
What skills are needed for Cybersecurity?

19 Dec
What is Cybersecurity?

17 Dec
Can I teach myself Cyber Security?

15 Dec
Is C++ good for Cyber Security?

12 Dec
Top 7 Popular Cyber Threat Models

10 Dec
Does Cybersecurity require a lot of math?

08 Dec
Is Python Good for Cyber Security

05 Dec
What are the Top 5 most popular Cybercrimes

03 Dec
California Consumer Privacy Act (CCPA) Explained

01 Dec
Is Cybersecurity well paid?

28 Nov
What to do when your business gets hacked

28 Nov
System Hardening for Configuration Management

26 Nov
Why is Patching Software Important for Security

21 Nov
A Guide to Computer Malware

19 Nov
Why you are underpaid as a cybersecurity professional

14 Nov
How to Test your Business Continuity and Disaster Recovery Plan

12 Nov
A Guide to PIPEDA Compliance for Canadian Businesses

07 Nov
Business Continuity Planning for a Small Business

05 Nov
What is a Security Clearance and how do you qualify? (US and Canada)

04 Nov
Disaster Recovery Planning for Small Businesses

30 Oct
Types of Security Controls for a small business

28 Oct
SOX Compliance: Rules, Fines and Auditing

23 Oct
Home Security for elderly family members

21 Oct
A Journalist’s guide to online anonymity and secure communications

16 Oct
GDPR Compliance Explained

15 Oct
How to properly negotiate for a Pay Raise

14 Oct
What to do when you’re booted offline while gaming

14 Oct
Linux Academy Online Learning Platform Review

13 Oct
HIPAA Security Rule Explained

13 Oct
Introduction to HIPAA Compliance

13 Oct
Job vs Career: What’s the difference?

09 Oct
How to Handle Media during a Cybersecurity Breach

08 Oct
How to be PCI-DSS Compliant

07 Oct
How to stop DDOS while gaming

06 Oct
Intro to Home Security

02 Oct
How to Recruit Good Security Professionals

02 Oct
Security Tips for the Software Development Lifecycle

01 Oct
Why Your Business Needs Cyber Insurance

30 Sep
Tips for Email Security

26 Sep
How to keep your PSN account from getting hacked

25 Sep
Introduction to Corporate Investigations

23 Sep
How to Defend Against Insider Threats

18 Sep
Physical Security Best Practices

16 Sep
What is a SIEM?

11 Sep
What is a Bug Bounty Program?

09 Sep
How to Properly Negotiate your Salary in Tech

04 Sep
Top Resources for a CISO

04 Sep
How To Protect Your Startup Intellectual Property

02 Sep
Why you should use Password Managers

01 Sep
Top Cybersecurity Certifications

26 Aug
Authentication Methods for IAM

25 Aug
How to Create a Strong Password Policy

20 Aug
What is a Cybersecurity Framework?

13 Aug
15 Key Technologies for Securing your AWS Cloud Infrastructure

06 Aug
How to gain experience without a Job

27 Jul
Python Tutorial Part2 Pyautogui

22 Jul
Python Tutorial Part1 Regex

11 Jul
How to prepare for an entry level job interview?

11 Jul
Where can I learn to code?

08 Jul
Cybersecurity Hacking Epidemic

08 Jul
What impact does cybersecurity have on the economy?

01 Jul
Artificial Intelligence: Do robots pose a threat?

01 Jul
Bitcoin: The leader of Cryptocurrencies

01 Jul
Honeypots A Key to Network Reconnaissance

01 Jul
Virtual Inoculation: The New Digital Vaccine

01 Jul
What is Symmetric and Asymmetric Encryption?

01 Jul
What is Ransomware?

01 Jul
What is a Hacker?
SimpleProgrammer
Simple Programmer is focused on helping software developers, programmers and other IT professionals improve their careers and live better lives. I write articles that teach programmers how to write more secure applications and teach security professionals about programming topics that are relevant in the security industry.