Friday - October 18th, 2024
Apple News
×

What can we help you find?

Open Menu
Jonathan Steele Founder and CEO of Steele Fortress

Jonathan is a seasoned Cybersecurity and privacy specialist with a unique background in law. His journey from being a top-rated family law attorney to a cybersecurity expert is a testament to his adaptability and commitment to mastering new fields.

Jonathan began his career in family law, earning recognition as one of the top ten family law attorneys in Illinois under the age of 40 by both the National Academy of Family Law Attorneys and the American Institute of Family Law Attorneys. His peers recognized his exceptional work and named him a Rising Star attorney, a designation limited to less than 2.5% of lawyers under 40 years of age in Illinois. He was also recognized as Leading Lawyers Emerging Lawyer, a designation reserved for less than 2% of Illinois attorneys, and a Super Lawyers Rising Star.

Transitioning from law to cybersecurity, Jonathan has spent years researching all aspects of cybersecurity and privacy. He has become well-versed in the Sophos ecosystem, setting up MDM solutions across a fleet of iOS devices, configuring next-gen enterprise-grade Sophos XG firewalls for home use, and setting up Synology NAS solutions for self-hosting calendar solutions, surveillance systems, photo storage, and video hosting. He is proficient in ZTNA and VPN setup and configuration, end-to-end encrypted solutions, privacy-respecting software and hardware solutions, and compartmentalization strategies. His expertise also extends to multifactor authentication, setup and management of self-hosted IDP solutions, custom DNS filtering and configuration, website setup, configuration, Security and management, and macOS, Windows, iOS setup and configuration to enhance security and privacy.

Enhancing his credentials further, Jonathan recently earned the CompTIA Security+ certification. This globally recognized achievement confirms his advanced skills in cybersecurity and his ability to handle complex security issues. This certification reflects Jonathan’s dedication to maintaining the highest standards of security expertise, ensuring that he is equipped with the latest knowledge and best practices in the rapidly evolving cybersecurity field.

At Steele Fortress, Jonathan leverages his unique blend of legal and cybersecurity expertise to provide comprehensive cybersecurity and privacy consulting services. His deep understanding of both the legal and technical aspects of cybersecurity and privacy makes him a valuable asset to any organization looking to bolster their security posture and navigate the complex landscape of cybersecurity laws and regulations.

Recent Content

Loading...
Scanning Trouble: Navigating Illinois’ Biometric Information Privacy Act &Raquo; 2398
Scanning Trouble: Navigating Illinois’ Biometric Information Privacy Act

Scanning Trouble: Illinois' Biometric Information Privacy Act (BIPA) is a critical regulation for safeguarding personal data. Learn about its key provisions, compliance requirements, and real-world im…

Scanning Trouble: Il…

Scanning Trouble: Illinois' Biometric Information Privacy Act (BIPA) is a critical regulation for safeguarding personal data. Learn about its key provisions, compliance requirements, and real-world implications in our comprehensive guide. Stay informed and protected in the biometric era.

Read More
Cellebrite Unplugged: The Spy Tool That Can’t Keep A Secret &Raquo; 2398
Cellebrite Unplugged: The Spy Tool That Can’t Keep a Secret

Cellebrite Unplugged: Discover the world of Cellebrite, a leading mobile forensics company, and explore its powerful tools used by law enforcement and private investigators to unlock and extract data …

Cellebrite Unplugged…

Cellebrite Unplugged: Discover the world of Cellebrite, a leading mobile forensics company, and explore its powerful tools used by law enforcement and private investigators to unlock and extract data from mobile devices. Learn about the implications for cybersecurity, privacy concerns, and the ethical debates surrounding the use of such advanced Technology. Stay informed on the evolving landscape of mobile forensics and the balance between security and privacy in our increasingly connected world.

Read More
Guardians Of The Digital Frontier: Privacy And Cybersecurity Tips For The Savvy Baby Boomer &Raquo; 2398
Guardians of the Digital Frontier: Privacy and Cybersecurity Tips for the Savvy Baby Boomer

Protect your digital life with our comprehensive guide tailored for Baby Boomers. Learn about common cyber threats, secure your online presence with strong passwords and two-factor authentication, and…

Protect your digital…

Protect your digital life with our comprehensive guide tailored for Baby Boomers. Learn about common cyber threats, secure your online presence with strong passwords and two-factor authentication, and discover safe online shopping tips. Stay informed and prepared with practical advice on privacy and cybersecurity. Stay safe and confident online!

Read More
The State Of Free Speech: Murthy V. Missouri And The Social Media Showdown &Raquo; 2398
The State of Free Speech: Murthy v. Missouri and the Social Media Showdown

Explore the landmark case Murthy v. Missouri, examining its impact on free speech, government influence, and social media moderation. Delve into the Supreme Court’s findings, the dissenting opinion,…

Explore the landmark…

Explore the landmark case Murthy v. Missouri, examining its impact on free speech, government influence, and social media moderation. Delve into the Supreme Court’s findings, the dissenting opinion, and broader implications for public health, democracy, and tech company responsibilities. Stay informed on this critical legal and societal issue.

Read More
Exploring The Intersection Of Cybersecurity And Family Law &Raquo; 2398
Exploring the Intersection of Cybersecurity and Family Law

Join Jonathan Steele on the Lawyers & Mediators International Podcast as he discusses the vital intersection of family law and cybersecurity. Learn essential tips on privacy protection, securing perso…

Join Jonathan Steele…

Join Jonathan Steele on the Lawyers & Mediators International Podcast as he discusses the vital intersection of family law and cybersecurity. Learn essential tips on privacy protection, securing personal devices, and the role of AI in legal practices. Discover the importance of safeguarding personal information in family law cases.

Read More
Cyberstalking And Domestic Abuse: How To Outsmart The Digital Villain &Raquo; 2398
Cyberstalking and Domestic Abuse: How to Outsmart the Digital Villain

Cyberstalking in domestic abuse cases is a growing threat. Learn how to recognize the signs and implement effective digital safety measures to protect yourself. Discover legal protections and resource…

Cyberstalking in dom…

Cyberstalking in domestic abuse cases is a growing threat. Learn how to recognize the signs and implement effective digital safety measures to protect yourself. Discover legal protections and resources available to victims. Outsmart the digital villain with these essential tips.

Read More
Guardians Of Fame: Navigating Privacy And Security In The Spotlight &Raquo; 2398
Guardians of Fame: Navigating Privacy and Security in the Spotlight

Celebrities, athletes, and politicians face unique privacy and security challenges. Discover the legal and practical strategies to protect their identities, including the use of pseudonyms in litigati…

Celebrities, athlete…

Celebrities, athletes, and politicians face unique privacy and security challenges. Discover the legal and practical strategies to protect their identities, including the use of pseudonyms in litigation. Learn how to guard against threats while maintaining a public presence.

Read More
Privacy Pitfalls: When Good Advice Goes Bad (Legally Speaking) &Raquo; 2398
Privacy Pitfalls: When Good Advice Goes Bad (Legally Speaking)

Privacy tips are crucial, but some well-meaning advice can lead to legal trouble. Discover common privacy practices that may violate the law and learn how to stay compliant while protecting your infor…

Privacy tips are cru…

Privacy tips are crucial, but some well-meaning advice can lead to legal trouble. Discover common privacy practices that may violate the law and learn how to stay compliant while protecting your information.

Read More
Real Estate Cloak And Dagger: How To Hold Title And Keep Your Privacy Intact &Raquo; 2398
Real Estate Cloak and Dagger: How to Hold Title and Keep Your Privacy Intact

Real Estate Cloak and Dagger: Discover the best ways to hold title to real Estate in Illinois while maintaining your privacy. From land trusts to anonymous LLCs, our guide covers the pros and cons of …

Real Estate Cloak an…

Real Estate Cloak and Dagger: Discover the best ways to hold title to real estate in Illinois while maintaining your privacy. From land trusts to anonymous LLCs, our guide covers the pros and cons of each method, helping you protect your identity and assets effectively.

Read More
Peek-A-Boo! Who’s Watching You At Work &Raquo; 2398
Peek-a-Boo! Who’s Watching You at Work

Peek-a-Boo: In today's digital workplace, balancing robust security measures with employee privacy is crucial. As companies mandate security apps on devices, understanding the legal and ethical implic…

Peek-a-Boo: In today…

Peek-a-Boo: In today's digital workplace, balancing robust security measures with employee privacy is crucial. As companies mandate security apps on devices, understanding the legal and ethical implications is essential. This post explores the tension between corporate data protection and personal privacy, offering insights on navigating BYOD policies and legal frameworks.

Read More
Kidnapped Connections: How Hackers Are Turning Executives’ Worst Fears Into Reality &Raquo; 2398
Kidnapped Connections: How Hackers Are Turning Executives’ Worst Fears Into Reality

Kidnapped Connections: Explore the alarming trend of ransomware attackers targeting the children of corporate executives. This post delves into how cybercriminals exploit familial connections to bypas…

Kidnapped Connection…

Kidnapped Connections: Explore the alarming trend of ransomware attackers targeting the children of corporate executives. This post delves into how cybercriminals exploit familial connections to bypass corporate security, highlighting the importance of personal cyber hygiene to safeguard family members from becoming the weakest link in corporate security chains.

Read More

Contributors

Show More

Keep Up To Date With Our Latest Baby Boomer News & Offers!

Sign Up for Our FREE Newsletter

Name(Required)
This field is for validation purposes and should be left unchanged.

(( NEW ))