Articles by
Anthony Rexsun
Anthony Rexsun is a [Cybersecurity Architect & Strategist] and the voice behind Home Privacy Network (HPN), where he translates enterprise-grade security into practical, family-first protection. He partners with FEMA and large enterprises to develop cybersecurity policies, incident-response playbooks, security awareness training, and CSIRT programs—then distills those lessons into clear guides for home networks, IoT security, and online privacy.
Anthony’s writing covers next-generation firewalls (NGFW), DNS filtering, VPN best practices, phishing defense, network segmentation, and zero-trust principles adapted for households and small businesses. His mission is simple: protect children and finances by blocking trackers and scams, reducing attack surface, preventing objectionable content, and securing data at home and in the office—without surrendering control to the cloud.
On the HPN blog, you’ll find step-by-step setups, buyer’s guides, hardening checklists, and field notes from real-world deployments that make modern cybersecurity understandable, actionable, and future-proof.
Featured
Zero-Day Vulnerabilities: What Home Users Should Know & Monitor
As a home user, you might not know about the dangers of zero-day vulnerabilities in your network....
Featured
Understanding Ransomware: How It Can Attack Your Smart Home
You've invested in a smart home to make your life easier and safer. But, with more connected...
Featured
Router Logs & ISP Monitoring: What They Can See & What You Can Do
When you connect your devices to the internet, you might wonder what info your router and Internet...
Featured
Secure Boot & BIOS/UEFI Settings: What Home Users Should Change
Keeping your computer safe is key in today's world. One important step is setting up BIOS/UEFI settings,...
Featured
Securing Voice Assistants: Alexa, Google Assistant & Siri Best Practices
You use voice assistants like Amazon Alexa, Google Assistant, and Apple Siri to make life easier. But,...
Featured
Phishing Attacks Targeting Home Networks: How to Spot & Block Them
Cybercriminals are now exploiting vulnerabilities in home networks to get to sensitive info. They use phishing, a...
Featured
IoT Botnets: What They Are & How to Prevent Your Devices from Joining One
The Internet of Things (IoT) has changed how we live and work. It has also brought new...
Featured
Understanding Ransomware: How It Can Attack Your Smart Home
You've made your home smart, but have you thought about the cyber threats it faces?Ransomware is a...
Want to stay up to date with the latest news?
We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!
