digital-logo digital-logo
  • Websites
    • How to Create a Website
    • How to Make a Wordpress Website
    • How to Start a Blog
    • How Much Does a Website Cost?
    • Best Website Builders
    • Squarespace
    • GoDaddy
    • Web.com
  • Web Hosting
    • Best Web Hosting
    • Wordpress Hosting
    • Shared Hosting
    • Dedicated Web Hosting
    • Managed Hosting
    • How Do I Switch Web Hosting?
    • Compare Hosts
    • Bluehost
    • WPEngine
    • SiteGround
  • E-commerce
    • Best E-commerce Platforms
    • Best E-commerce Website Builders
    • How to Sell on Amazon
    • Shopify Tips
    • BigCommerce
    • Shopify
    • WooCommerce
  • Marketing & Sales
    • A Complete Guide to Online Marketing
    • Marketing Tools
    • Email Marketing Platforms
    • CRM Software
    • Create Your Own Email Address with Gmail
  • Security
    • How to Set Up a VPN
    • Best VPN Services
    • Password Managers
    • Password Generators
  • HR & Finance
    • How to Prepare a P&L
    • HR Software
    • Accounting Software
    • Payroll Software
    • Sales Tax Software
  • Resources
    • Software & Service Reviews
    • Who is Hosting This?
    • What's Your IP Address
    • Hosting Speed Test
    • HTML Cheat Sheet
  • Home
  • / About

Nick Morpus

IT Security & Project Management Expert

Updated July 18, 2022

AJ Dellinger headshotNick Morpus is an analytical cybersecurity specialist with an NCSA/NCSP from NextGenT. He has experience in cyber threat hunting with Wireshark, NMAP, Kali Linux, and many other tools.

He is also well-versed in cloud and perimeter security concepts including SASE architecture, Zero Trust, VPNs, firewalls, and SD-WAN.

Linkedin Icon Purple

Articles by Nick Morpus

  • What Is a Firewall and How Does It Work?
  • What Is Spear Phishing and How To Avoid an Attack
  • Cybersecurity Resources for Small Businesses
  • The Difference Between Cyber Security and IT Security
  • What Is Perimeter Security Architecture?
  • What Is Ransomware and How to Avoid it
  • How To Develop a Small Business Cybersecurity Plan
  • What Is a Network Intrusion Prevention System?
  • Is Text Messaging Secure for Your Business?
  • What Are the Three Types of Firewalls?
  • How to Encrypt Your Text Messages
  • What Is Zero Trust Architecture for Small Business Networks?
  • What Is the Cybersecurity Kill Chain?
  • The Mindset of Hackers: How to Protect Your Business
  • What Is Internet of Things (IoT) Security?
  • What Are the Top Cybersecurity Threats of 2023?
  • Does a VPN Protect Your Business From Trojans?
  • What Is Endpoint Detection and Response (EDR) Software?
  • How Does Running Your Business From Home Impact Cybersecurity?
digital-logo Learn About Us
  • POPULAR WEB BUILDERS

    • Squarespace
    • GoDaddy Websites + Marketing
    • Wix
    • WordPress.com
    • More Builders…
  • POPULAR WEB HOSTS

    • Bluehost
    • WP Engine
    • DreamHost
    • SiteGround
    • A2 Hosting
    • HostGator
    • More Web Hosts…
    • BlueHost vs SiteGround
  • POPULAR BLOG POSTS

    • Beginner’s Guide: How To Start a Blog
    • Dropshipping: How to Get Started
    • Resources for Women-Owned Small Businesses
    • The Complete Guide to Stock Photos
    • Why Use a VPN?
    • How to Start an LLC
    • Create A Custom Email Address With Gmail
    • Resources for Small Business

© 2019 Digital.com

  • 600 Stewart St, Ste 400, Seattle, WA 98101
  • About Us
  • Privacy Policy
  • Affiliate Disclosure
  • Sitemap