Skip to content
May 9, 2025
  • Welcome – Start Here
  • Staying Safe OnLine
  • My Gear
  • About Me – The Early Years.
  • Blog Ideas & Topics – The List.

The Cyber Hound Tech Security Blog!

My Journey into Hacking and Cybersecurity!

  • Welcome – Start Here
  • Staying Safe OnLine
  • My Gear
  • About Me – The Early Years.
  • Blog Ideas & Topics – The List.
Watch Online
  • Home
  • Gear Insight and reviews
  • EDC – The Every Day Carry – Part One
  • Gear Insight and reviews

EDC – The Every Day Carry – Part One

George April 10, 2022

Share this:

  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Facebook (Opens in new window) Facebook
EDC Kit - OverView

My EDC Kit

April 10, 2022

I am really excited to write this blog page today. I am a massive proponent of Every Day Carry or EDC!

In my eyes, I see EDC as a needed part of anyone’s daily routine. In this post, my hope is to help others know the value of EDC and what to carry.

While I know that there are entire threads of sub-Reddit, Youtube Creators, and web pages entirely dedicated to EDC! I would like to bring my blogs audience to this party of my day.

Websites like everyday carry (dot) com and kit (d0t)com give their users insight into what other users are carrying. I’d like to think that everyone has a different opinion of why and what to take. I don’t believe that there is a wrong answer to this question why EDC! From the 1st responder to the Doomsday Prepper. We all have our unique take on EDC.

EDC can be fun; so many people who strongly believe in EDC, as do I!

With my recent deep dive into all things Security, I have a new lesson and insight into my EDC kit. While is common knowledge that when a mobile device is plugged into a computer, that computer has some (if not complete) access to the device. In other words, when a phone is plugged into a desktop, and if the user gives permission, the computer has access to, Text Messages, Phone Calls History, and files such as your photos and your recordings. While in most cases, you would want this. But stop for a minute and think? What happens when you are not home, at your place of employment, friend’s house, or you need to charge at a place you don’t know well?

Let us talk about our place of employment? Employers today must protect their data and their client data from exploitation. Data breaches are a common threat and today’s corporations’ are the most common targets. Today office space now has tools to protect their intellectual data, from Active Scanning to Data Loss Prevention, all sorts of new and emerging tech to stay ahead of today’s data breach.

What about you in this new world of breaches. What happens when you plug your phone into your office computer? For starters, any phone can be a threat to the data today’s cybersecurity professional is trying to protect. It is not unreasonable to understand why the owner of that actual computer would like to scan your phone or device for threats! After all, you did plug into someone else’s computer. Please remember that your work computer, despite your data, really belongs to the employer and not you.

This scanning of your phone or device doesn’t stop with employers; the same tools are available for anyone to use. Do you want your friends with access to your photos and data?

I am sure people are saying at this point, I don’t care who has access to my photos. I have nothing to hide?

Well, the answer is you should care. Even if you are 100% certain, you have nothing to hide. You should care! Think about the photos you might have on your phone. Do you have any risky pictures of someone? Are they going to want those leaked out on the internet to see? The Meme, you saved could they be offensive to someone in the future and cost me a job. This list of reasons why is endless.

So we all need to protect our phones. No more plugging in to computers! Great, now I am safe, well you might think that. Well no.

Today’s threats!

Rouge USB and rouge USB cables, can you really trust the cable or the charging port in your daily travels? The answer is no, bad actors want your data, cybercriminals want to hold your data for ransom, and people want to spy on your photos. These are just a few of the bad apples. Its only a matter of time before that charge port at the store will scan your phone to sell you ads!

In today’s ever-growing threat world, carry your own cables and power, don’t trust the wires. I will in later blogs go more in-depth into the threats out there.

To Be Continued

My current EDC Kit

  1. Always, ALWAYS carry a Knife.
  2. Have a pen or Pencel
  3. Have a notepad,
  4. Small flashlight
  5. Malicious Cable Detector from HAK5
  6. USB-C cable
  7. Lighting Cable
  8. MicroUSB Cable
  9. Battery Pack

Protect yourself and your data!

April 10, 2022

I am really excited to write this blog page. I am a massive proponent of Every Day Carry or EDC!

In my eyes, I see EDC as a needed part of anyone’s daily routine. In this post, my hope is to help others know the value of EDC and what to carry. 

While I know that there are entire threads of sub-Reddit, Youtube Creators, and web pages entirely dedicated to EDC! I would like to bring my blogs audience to this party of my day. 

Websites like everyday carry (dot) com and kit (d0t)com give their users insight into what other users are carrying. I’d like to think that everyone has a different opinion of why and what to take. I don’t believe that there is a wrong answer to this question why EDC! From the 1st responder to the Doomsday Prepper. We all have our unique take on EDC.

EDC can be fun; so many people who strongly believe in EDC, as do I!

With my recent deep dive into all things Security, I have a new lesson and insight into my EDC kit. While is common knowledge that when a mobile device is plugged into a computer, that computer has some (if not complete) access to the device. In other words, when a phone is plugged into a desktop, and if the user gives permission, the computer has access to, Text Messages, Phone Calls History, and files such as your photos and your recordings. While in most cases, you would want this. But stop for a minute and think? What happens when you are not home, at your place of employment, friend’s house, or you need to charge at a place you don’t know well?

Let us talk about our place of employment? Employers today must protect their data and their client data from exploitation. Data breaches are a common threat and today’s corporations’ are the most common targets. Today office space now has tools to protect their intellectual data, from Active Scanning to Data Loss Prevention, all sorts of new and emerging tech to stay ahead of today’s data breach. 

What about you in this new world of breaches. What happens when you plug your phone into your office computer? For starters, any phone can be a threat to the data today’s cybersecurity professional is trying to protect. It is not unreasonable to understand why the owner of that actual computer would like to scan your phone or device for threats! After all, you did plug into someone else’s computer. Please remember that your work computer, despite your data, really belongs to the employer and not you. 

This scanning of your phone or device doesn’t stop with employers; the same tools are available for anyone to use. Do you want your friends with access to your photos and data? 

I am sure people are saying at this point, I don’t care who has access to my photos. I have nothing to hide? 

Well, the answer is you should care. Even if you are 100% certain, you have nothing to hide. You should care! Think about the photos you might have on your phone. Do you have any risky pictures of someone? Are they going to want those leaked out on the internet to see? The Meme, you saved could they be offensive to someone in the future and cost me a job. This list of reasons why is endless. 

So we all need to protect our phones. No more plugging into computers! Great, now I am safe, well you might think that. Well no. 

Today’s threats!

Rouge USB and rouge USB cables, can you really trust the cable or the charging port in your daily travels? The answer is no, bad actors want your data, cybercriminals want to hold your data for ransom, and people want to spy on your photos. These are just a few of the bad apples.

This is my take on EDC or Everyday Carry. In the series, I explore the need for everyday carry and the items I make sure to have with me every day. Please join me in part 4 of the series! It’s only a matter of time before that charge port at the store will scan your phone to sell you ads!

In today’s ever-growing threat world, carry your own cables and power, don’t trust the wires. I will in later blogs go more in-depth into the threats out there.  

My EDC Kit

  1. Always, ALWAYS carry a Knife.
  2. Have a pen or Pencel
  3. Have a notepad,
  4. Small flashlight
  5. Malicious Cable Detector from HAK5
  6. USB-C cable
  7. Lighting Cable
  8. MicroUSB Cable
  9. Battery Pack

Protect yourself and your data!

Like this:

Like Loading...

Related

Tags: Be Prepared Cyber Cyber Security Gear CyberSecurity EDC EveryDay Carry Gear

Continue Reading

Previous: Spam Already & We are not even live!
Next: Trial and Error – Setting up my CyberLab.

Related Stories

The Importance of Multi-Factor Authentication (MFA) erson using a mobile authentication app on their smartphone with a secure lock icon overlay. In the background, a computer screen shows multiple login attempts being blocked. The setting is a modern home office with a clean, professional look, emphasizing security and protection.
  • Gear Insight and reviews
  • Journey into CyberSec

The Importance of Multi-Factor Authentication (MFA)

July 8, 2024
Seriously FanBoying right now!!
  • Gear Insight and reviews

Seriously FanBoying right now!!

April 24, 2022
Hello and Welcome, To this Brave new Cyber world! Lucy The Cyber Hound
  • Gear Insight and reviews

Hello and Welcome, To this Brave new Cyber world!

April 9, 2022

Thanks for the visit!

Welcome to My Blog! This is a work in  progress. Each week, I hope to explore the world of CyberSecurity, and All Things IT.

I am a 4X year old IT professional with a few different learning disabilities that I struggle with! I am here to create a safe place for all, with my insight of what worked for me and what hasn’t. My goals are to move more into a security focused role.

Please keep me honest and let me know what you think. I struggle with writing, and spelling. My hope with this blog is to get better with both, I relay heavily on tools like Grammarly (paid) and Yoast SEO (free) for grammar, writing and spelling. No tool is perfect and honestly neither am I!

Please let me know how you page to this page in the comments on Twitter.  I really am learning and trying to write better.

Again welcome to my blog, join me as I start a deep dive in to all things CyberSecurity!

Trust Your Technolust!

You may have missed

Critical Tips to Safeguard Against Online Scams and Extortion
  • Journey into CyberSec

Critical Tips to Safeguard Against Online Scams and Extortion

August 5, 2024
The Importance of Multi-Factor Authentication (MFA) erson using a mobile authentication app on their smartphone with a secure lock icon overlay. In the background, a computer screen shows multiple login attempts being blocked. The setting is a modern home office with a clean, professional look, emphasizing security and protection.
  • Gear Insight and reviews
  • Journey into CyberSec

The Importance of Multi-Factor Authentication (MFA)

July 8, 2024
Understanding the US Government’s Ban on Kaspersky Software: Implications for Cybersecurity
  • My Thoughts

Understanding the US Government’s Ban on Kaspersky Software: Implications for Cybersecurity

June 24, 2024
Protecting Healthcare: How to Combat Hackers Targeting IT Help Desks
  • Journey into CyberSec

Protecting Healthcare: How to Combat Hackers Targeting IT Help Desks

April 15, 2024
  • Blog Ideas & Topics - The List.
  • My Gear
  • Staying Safe OnLine
  • Welcome - Start Here
    • About Me - The Early Years.
  • Welcome – Start Here
  • Staying Safe OnLine
  • My Gear
  • About Me – The Early Years.
  • Blog Ideas & Topics – The List.
Copyright © All rights reserved. | DarkNews by AF themes.
%d