The Top Nine Ways to Avoid Being Hacked: Essential Tips for Staying Safe Online

Cyber threats are everywhere. Learn nine expert-approved cybersecurity practices, from password hygiene to phishing prevention, that help protect your data, privacy, and peace of mind.

In today’s hyperconnected world, being hacked isn’t just a risk — it’s a near inevitability if you’re not prepared. Whether you’re an individual, a small business owner, or part of a larger organization, protecting your data should be a daily habit, not an afterthought.

Hackers exploit the smallest cracks: weak passwords, outdated software, and misplaced trust. The good news? A few consistent habits can make you a far harder target.

Here are nine proven ways to reduce your risk of being hacked, simple, practical, and backed by modern cybersecurity best practices.

  1. Use Strong, Unique Passwords

Weak or reused passwords remain one of the top causes of account compromise.
A strong password should be:

  • At least 12 characters long
  • Include a mix of upper and lowercase letters, numbers, and symbols
  • Avoid personal details like your pet’s name or birthday

Pro Tip: Use a password manager to create and store unique credentials safely — it’s far more secure than your memory (or sticky notes).

2. Enable Multi-Factor Authentication (MFA)

If passwords are your front door, MFA is your deadbolt.
This simple tool requires an additional verification step — like a text message code or an authentication app prompt — before granting access.

Even if a hacker steals your password, MFA can stop them cold.
Enable it everywhere you can: email, banking, social media, and especially your work accounts.

  1. Keep Software and Systems Updated

Cyber attackers love outdated software — it’s like an open window.
Enable automatic updates on your devices, browsers, and security tools to patch vulnerabilities before attackers can exploit them.

Updates aren’t annoyances; they’re armor.

4. Spot and Stop Phishing Scams

Phishing remains the #1 way users get hacked.
Attackers use fake emails or messages that mimic trusted sources to trick you into clicking malicious links or revealing credentials.

Stay sharp:

  • Check sender addresses carefully
  • Hover over links before clicking
  • Be skeptical of urgent or emotional language (“Your account will be suspended!”)
  • When in doubt, contact the organization directly

Education here pays off, once you’ve spotted a good phish, you’ll never unsee the patterns.

  1. Secure Your Home Network
  • Your Wi-Fi router is the gateway to everything on your home network.
  • Change the default password immediately after setup.
  • Use WPA3 encryption (the most secure standard).
  • Disable WPS and consider hiding your SSID.
  • Set up a guest network to isolate visitors and IoT devices.

A few minutes of setup can close the door on thousands of automated attacks.

  1. Use a Virtual Private Network (VPN)

When connecting to public Wi-Fi (airports, cafes, hotels) use a VPN to encrypt your internet traffic. This prevents hackers from intercepting data like login credentials and personal info.

Choose a reputable, paid VPN provider. (Free ones often collect your data instead of protecting it.)

7. Be Mindful of What You Share Online

Every social post is a breadcrumb. Hackers use personal details to guess passwords, craft phishing messages, or reset your accounts.

Limit what you share publicly, especially location check-ins and birthdates.
Remember: oversharing fuels social engineering — the human side of hacking.

  1. Regularly Back Up Your Data

Ransomware doesn’t work if your data is safely backed up.
Use the 3-2-1 rule:

  • 3 total copies of your data
  • 2 different storage types (cloud + external drive)
  • 1 kept offline

Automate backups and test them occasionally — a broken backup is no backup at all.

9. Educate Yourself and Your Circle

Technology changes fast — human habits change slowly. Stay updated on emerging threats, and share what you learn with coworkers, friends, or family.

Security awareness training and cybersecurity newsletters are excellent ongoing resources.

Cybersecurity is everyone’s job. The more we all understand, the safer we all become.

Final Thoughts

Avoiding being hacked isn’t about paranoia — it’s about preparation.
Each of these habits strengthens your security posture one layer at a time.

Think of cybersecurity as compound interest: small daily actions, multiplied over time, create unbreakable resilience.

Stay curious. Stay cautious. Stay secure.

*Updated October 2025: refreshed to reflect updated security practices for the modern threat landscapes.

Hypertrophy Phase for Building Strength in the High Bar Back Squat

Here’s a sample 8-Week Hypertrophy Phase for Building Strength in the High Bar Back Squat.
The high bar back squat is a foundational exercise for developing leg strength, power, and muscle hypertrophy. This 8-week hypertrophy program focuses on squatting twice a week, with an emphasis on high-repetition sets in the 15-20 rep range to stimulate muscle growth. Complementary accessory exercises, proper recovery, and nutrition are also crucial for maximizing gains during this phase.

Program Overview
The 8-week hypertrophy phase is divided into two 4-week blocks. Each block progressively increases the intensity and volume of your workouts to optimize muscle growth and strength. The program includes two squat sessions per week, supplemented with accessory exercises to target supporting muscle groups and ensure balanced development.

Week 1-4: Volume Accumulation

Focus: Build a foundation of muscle mass and muscle endurance.

  • Rep Range: 15-20 reps
  • Intensity: 50-60% of 1RM
  • Frequency: Twice per week

Week 5-8: Intensification

Focus: Increase intensity, maintaining high volume, and technical proficiency.

  • Rep Range: 12-15 reps
  • Intensity: 60-70% of 1RM
  • Frequency: Twice per week

Weekly Training Schedule

– Monday: High Bar Back Squat Focus

  • High Bar Back Squat: 4 sets of 15-20 reps
  • Romanian Deadlifts: 3 sets of 15-20 reps
  • Bulgarian Split Squats: 3 sets of 15-20 reps per leg
  • Front Foot Elevates Split Squat (FFESS): 3 sets of 20 reps – 10 per leg
  • Single leg, body weight calf raises: 3 sets of 20-25 reps

– Thursday: High Bar Back Squat Focus

  • High Bar Back Squat: 4 sets of 15-20 reps
  • Walking Lunges: 3 sets of 15-20 reps per leg
  • Front Squats: 3 sets of 10 reps at 40-50%
  • Frog Pumps: 3 sets of 15-20 reps
  • Tib Raises: 3 sets of 30 reps

Week 5-8 Adjustments

As you progress into the second block, increase the intensity by raising the weight and slightly lowering the rep range to 12-15 reps per set while maintaining the same structure and exercise selection.

Monday: High Bar Focus

  • High Bar Back Squat: 4 sets of 12-15 reps
  • Romanian Deadlifts: 3 sets of 12-15 reps
  • FFESS: 3 sets of 12-15 reps per leg
  • Reverse Hyper: 3 sets of 12-15 reps
  • Single leg, body weight calf raises: 3 sets of 15-20 reps

Thursday: High Bar Focus

  • High Bar Back Squat: 4 sets of 12-15 reps
  • Walking Lunges: 3 sets of 12-15 reps per leg
  • Front Squats: 3 sets of 10 reps at 40-50%
  • Frog Pumps: 3 sets of 15-20 reps
  • Tib Raises: 3 sets of 15-20 reps

Recovery and Nutrition: Prioritizing recovery and proper nutrition is crucial for maximizing gains during the hypertrophy phase:

Sleep: The NUMBER 1 thing you can fix to see increases in the gym — adequate rest and recovery! Aim for 7-9 hours of quality sleep each night to support muscle recovery and growth.

Nutrition:

Protein: Consume 1.6-2.2 grams of protein per kg of body weight daily to support muscle repair.

Carbohydrates: Ensure adequate carbohydrate intake to fuel workouts and replenish glycogen stores. Include complex carbs like whole grains, fruits, and vegetables.

Healthy Fats: Incorporate healthy fats from sources like avocados, nuts, seeds, and olive oil to support overall health and hormone production.

Hydration: Stay well-hydrated to maintain performance and facilitate recovery.

Active Recovery: Incorporate intensity work on such as MAP 10 training, walking, kayaking, yoga, or stretching on rest days to promote blood flow and reduce muscle soreness.

Monitoring Your Progress: Tracking your progress is essential for adjusting your program and ensuring continuous improvement:

Training Log: Record your workouts, including weights used, sets, reps, and any relevant notes on how you felt during each session.

Regular Testing: Periodically test your 1RM to gauge strength improvements and adjust training intensities accordingly. I’d suggest testing your 1RM every 3 to 4 months.

Adjustments: Based on your progress and recovery, modify variables such as intensity, volume, and exercise selection to avoid plateaus and continue making gains.

Final Thoughts:

An 8-week hypertrophy phase focused on the high bar back squat can significantly enhance your leg strength and muscle mass. By incorporating a structured training program that emphasizes high-repetition sets, prioritizing recovery and nutrition, and monitoring your progress, you can achieve substantial gains in your squat performance and overall strength. Stay consistent, maintain proper form, and adjust your program as needed to continue progressing towards your strength and hypertrophy goals.

Always remember, quality of reps over quantity of reps!

How To Program MAP 10 Aerobic Workouts

What are Map 10 Aerobic Workouts?

Map 10, which stands for Maximal Aerobic Power, simply means that work at this pace is very easy. As you move from MAP 10 to MAP 1, the pace increases as and the time of each interval drops in length.

Why do we love MAP 10 specifically?

It’s great for recovery!

The Story of OPEX Fitness and James FitzGerald | OPEX Fitness

MAP 10 Can Help You Recover from Soreness

A time tested and proven method that’s especially relevant to functional fitness athletes is mixing intense training with slow recovery sessions throughout the week. This style of training is often referred to as “High Low Method.”

OPEX Fitness calls the slow recovery style of aerobic work “MAP 10”. This is taught in the OPEX Coaching Certificate Program (CCP) because coaches must be able to prescribe a wide variety of training paces, dependent on their client’s needs. When programming different paces, coaches are also tapping into different energy systems. There are three main energy systems refer that we refer to as OPEX Gain, Pain, and Sustain:

(Coach’s Resource: Learn more about how to train specific energy systems in this free guide.)

  • Gain – this is scientifically referred to as the Anaerobic Alactic System. This system refers to very short, 1-20 seconds, bursts of energy at very high power, or “turnover.” Gain refers to you not being able to sustain your power output past that length of time because your muscles cannot continue to turn over fast enough
  • Pain – this is scientifically referred to as the Anaerobic Lactic System. This system refers to a longer interval time, 20 to 720 seconds, at higher power, or turnover. While the range is much longer, you’ll notice the word “Anaerobic” still remains in the name. That means that it isn’t aerobic which means that it isn’t sustainable. If you hold that higher power for those time periods, you will now “feel the burn” and you will recognize that you cannot hold that pace forever
  • Sustain – this is scientifically referred to as the aerobic system. This system refers to efforts that are sustainable. As you move from MAP 1 to MAP 10, your time frame gets even longer, and your power output goes down even more.

MAP 10 pace is on the far end requiring the most amount of time at the slowest pace with the least amount of power, therefore, falling under the Sustain “curve.” Whereas Gain begins with slow and low volume efforts in the beginning followed by a progression of faster, more voluminous efforts later. MAP 10 efforts should begin with longer efforts at a slower pace in the beginning (for most people). The reason MAP 10 needs to start with such long efforts is that you need to keep the pace easy. Very easy effort mixed with smaller amounts of eccentric muscle contractions is often interpreted as recovery by your body.

James FitzGerald vs. Carl Hardwick ...

How to Program MAP 10 Aerobic Workouts

When programming MAP 10 you often want to begin with more aerobic – long easier efforts – work before you implement Gain work into your client/athlete’s fitness program because it builds your ability to do more work – volume – in your training.

To benefit greatly from MAP 10 – and easy aerobic work – make sure you minimize the eccentric load on your client. In the video, you will notice that Solange is doing carries (overhead, suitcase, etc…), Flywheel biking, versa climbing, Front Leaning Rest – FLR (plank) on the rings – etc…The lack of eccentric work allows her body to get better recovery than she would if she was pounding her body day in and day out in her “aerobic” work.

To pick great MAP 10 workouts, you want to pick easy, non-eccentric work and “go easy.” You don’t need to overthink this. You just need to move blood, find relaxation and rhythm, and be consistent in “going long.” People get scared of doing a 60-minute workout because they are going long and hard. MAP 10 is long and easy! To progress in this, you will add volume, but you would still get the pace nice and easy.

Programming MAP 10 Aerobic Workouts For Athletes

High-level athletes may have five morning sessions of 60-90 minutes of MAP 10 work + two “off” days of three sessions/day of 60-90 min of easy aerobic pieces. It will be all different styles of movement but do the math of that volume. They may have 8-12 hours of easy aerobic work each week on top of 3-4 hours per week of intense work.

When you are doing your easy aerobic work, don’t be afraid to go at conversational pace or listen to a podcast or read a book if you are on a machine that allows you to do that. We don’t recommend Deadmau5 for easy aerobic work unless you want to “wake up” 20 min into a row at 180 beats per minute heart rate. Also, don’t be afraid to just walk (in the sun if possible)

james fitzgerald crossfit for Sale,Up To OFF 66%

Next Steps

MAP 10 is just tapping into one of the body’s three energy systems. If you are looking to become a professional coach and develop your programming ability download our free guide Energy System Training, today.

For more information visit Opexfit.com today!

Best Practices to Secure Data in a K-12 Environment

1. Implement Strong Access Controls

  • Role-Based Access Control (RBAC): Ensure that only authorized personnel have access to sensitive data. Assign permissions based on roles and responsibilities.
  • Multi-Factor Authentication (MFA): Require MFA for accessing sensitive systems and data to add an extra layer of security.

2. Regular Security Training and Awareness

  • Staff Training: Conduct regular cybersecurity training sessions for teachers, administrators, and support staff to recognize phishing attempts, social engineering, and other common threats.
  • Student Awareness: Educate students about safe online behaviors, the importance of password security, and how to avoid suspicious links and downloads.

3. Use Strong Password Policies

  • Complex Passwords: Enforce the use of strong, complex passwords that include a mix of letters, numbers, and special characters.
  • Password Management: Encourage the use of password managers to help staff and students manage their passwords securely.

4. Network Security

  • Firewalls: Deploy firewalls to protect the school’s network from unauthorized access and malicious traffic.
  • Intrusion Detection and Prevention Systems (IDPS): Implement IDPS to monitor and respond to potential threats in real time.
  • Segmentation: Segment the network to limit access to sensitive data and reduce the attack surface.

5. Data Encryption

  • Encryption at Rest and in Transit: Ensure that all sensitive data is encrypted both when stored and when transmitted over the network.
  • Secure Communication Channels: Use secure protocols like HTTPS, SSL/TLS, and VPNs for remote access and data transfer.

6. Regular Updates and Patch Management

  • Software Updates: Keep all software, including operating systems, applications, and security tools, up to date with the latest patches and security fixes.
  • Automated Patch Management: Use automated tools to manage and apply patches consistently and promptly.

7. Regular Backups and Disaster Recovery Planning

  • Data Backups: Perform regular backups of critical data and store them securely offsite or in the cloud.
  • Disaster Recovery Plan: Develop and regularly test a disaster recovery plan to ensure quick recovery from data breaches, ransomware attacks, or other disruptions.

8. Endpoint Security

  • Antivirus and Anti-Malware: Install and maintain up-to-date antivirus and anti-malware solutions on all devices.
  • Mobile Device Management (MDM): Use MDM solutions to manage and secure mobile devices used by students and staff.

9. Application Security

  • Secure Software Development: Ensure that applications developed or used by the school follow secure coding practices and are regularly tested for vulnerabilities.
  • Third-Party Applications: Vet and monitor third-party applications for security compliance before integrating them into the school’s IT environment.

10. Physical Security

  • Secure Access to Facilities: Implement physical security controls like locks, access badges, and surveillance cameras to protect areas where sensitive data is stored.
  • Device Management: Ensure that devices such as laptops, tablets, and USB drives are securely stored and tracked.

11. Incident Response and Management

  • Incident Response Plan: Develop and maintain a comprehensive incident response plan outlining steps to take in the event of a data breach or security incident.
  • Regular Drills: Conduct regular incident response drills to ensure that staff are prepared to handle security incidents effectively.

12. Compliance and Auditing

  • Regulatory Compliance: Ensure compliance with relevant regulations such as FERPA (Family Educational Rights and Privacy Act) and COPPA (Children’s Online Privacy Protection Act).
  • Regular Audits: Conduct regular security audits and assessments to identify and address vulnerabilities and ensure ongoing compliance with security policies.

Enhancing Explosiveness in Olympic Lifts with Plyometric Training

Plyometric training is an excellent way to develop the explosive power necessary for Olympic lifts like the snatch and clean and jerk. These dynamic movements help improve muscle recruitment, speed, and power, all of which are essential for successful Olympic lifting. By incorporating a weekly plyometric session into your training regimen, you can enhance your explosiveness and overall performance. This article outlines a comprehensive once-a-week plyometric workout designed to complement your Olympic lifting training.

Plyometric Training Overview

Plyometrics, or jump training, involves explosive movements that require rapid stretching and contracting of muscles. This type of training enhances the stretch-shortening cycle (SSC) of muscles, which is crucial for generating maximal force in a short amount of time. Plyometric exercises target the fast-twitch muscle fibers, which are responsible for explosive movements.

Key Benefits of Plyometric Training for Olympic Lifters:

  • Increased power output
  • Improved rate of force development
  • Enhanced neuromuscular coordination
  • Greater agility and balance
  • Reduced risk of injury through improved proprioception

Weekly Plyometric Workout

Perform this plyometric workout once a week, preferably on a day when you are not doing heavy lifting, to ensure you are fresh and can maximize your effort in each exercise. Always start with a proper warm-up and finish with a cool-down to reduce the risk of injury.

Warm-Up (10-15 minutes):

  • 2-3 mins on an Ski, bike or row erg
  • Dynamic Stretching: Leg swings, arm circles, hip rotations
  • Light Jogging or Jump Rope: 5-10 minutes to increase heart rate and blood flow
  • Mobility Drills: Ankle hops, high knees, butt kicks, hammie sweeps, et cetera

Plyometric Exercises:

Sets: 3
Reps: 2-3
Rest: rest :10-:12 between reps and 90 seconds

Description: Stand in front of a sturdy box or platform. 1/4 squat down, then explode upward, landing softly on the box with both feet. Step down and repeat.

Depth Jumps

Sets: 3
Reps: 3-5
Rest: rest :10-:12 between reps and 90 seconds

Description: Stand on a box, step off, and upon landing, immediately jump as high as possible. Focus on minimizing ground contact time to develop reactive strength.

Broad Jumps

Sets: 3
Reps: 2-3
Rest: :10-:12 between reps and 90 seconds

Description: Stand with feet shoulder-width apart. Perform a powerful squat jump forward, aiming for maximum distance. Land softly and reset for the next jump.

Single-Leg Bounding

Sets: 3
Reps: 3-4
Rest :10-:12 between reps and 90 seconds

Description: Hop forward on one leg, focusing on distance and height. Land softly and immediately bound forward again. Complete all reps on one leg before switching.

Tuck Jumps

Sets: 3
Reps: 3-5
Rest: 90 seconds

Description: Stand with feet shoulder-width apart. Jump as high as possible, tucking your knees toward your chest at the peak of the jump. Land softly and reset.

Medicine Ball Slams

Sets: 3
Reps: 3-5
Rest: 90 seconds

Description: Hold a medicine ball overhead. Explosively slam the ball into the ground, using your whole body. Pick up the ball and repeat.

Cool-Down (10 minutes):

Static Stretching: Hamstrings, quadriceps, calves, hip flexors
Foam Rolling: Focus on the legs and lower back to alleviate any tightness or soreness

How to Improve Your Deadlift for Olympic Weightlifting

Here’s a great exercise The Barbell Physio just dropped on their IG page:

Until next time…

Discover & Fingerprint: Nmap flags you should actually know (and when to use them)

Discovery and fingerprinting are where recon stops being guesswork and starts being a map. Over the next few weeks I’ll dig into Nmap and other recon tools — for now, here’s a compact, practical list of Nmap switches worth committing to memory for pentesting exams and real-world ops. Don’t just memorize the letters — learn the purpose and the use case.

Basic target input / listing

  • nmap -iL targets.txt
    Scan targets from a file. Use when you have a long list to automate.
  • nmap -iR 100
    Scan 100 random hosts. Good for practice/learning about global scanning patterns in a lab.
  • nmap 192.168.1.10 -sL
    List-only — no probes. Use to verify target resolution without touching ports.

Host discovery vs port scan

  • nmap 192.168.1.1/24 -sn
    Ping/host discovery only (no port scan). Fast way to find live hosts on a subnet.
  • nmap 192.168.1.1-5 -Pn
    Skip host discovery (treat hosts as up). Useful when ICMP/ARP are blocked but you still want to try ports.

Port specification

  • nmap 192.168.1.1 -p 21
    Scan a single port (FTP, in this example).
  • nmap 192.168.1.1 -p 21-100
    Scan a specific port range. Use when you want targeted scanning (faster than full 65k).

Service & OS fingerprinting

  • nmap 192.168.1.1 -sV
    Service/version detection. Helps identify vulnerable versions (e.g., out-of-date FTP/SSH).
  • nmap 192.168.1.1 -O
    Remote OS detection (TCP/IP stack fingerprinting). Useful when you need OS-level attack vectors.
  • nmap 192.168.1.1 -A
    Aggressive: OS detection + version detection + scripts + traceroute. Good for a quick, deep look — loud and obvious on the network.

Timing / IDS evasion

Timing templates adjust scan speed and stealth. Choose based on network reliability and detection risk.

  • -T0 Paranoid — ultra-slow. Used to evade IDS or noisy logging systems.
  • -T1 Sneaky — very slow.
  • -T2 Polite — slows scans to reduce bandwidth/impact on target.
  • -T3 Normal — default.
  • -T4 Aggressive — faster, assumes stable network.
  • -T5 Insane — very fast; only on extremely reliable links or internal lab networks.

Memory tricks & practical tips

  • I/O flags: -iL = Input List. File-based scanning automation.
  • List-only: -sL — “List targets only.” No probing.
  • Host discovery: -sn = scan no ports (ping only).
  • Skip discovery: -Pn = treat hosts as Up (No ping).
  • Service info: -sV for service Version, -O for OS.
  • One-shot vs range: -p 21 vs -p 21-100. Single vs range.
  • Aggressive -A = one-shot deep recon; loud but thorough.
  • Timing -T# = speed vs stealth. 0 is slowest/most stealthy; 5 fastest.

Mini workflows (real use-cases)

  • Quick inventory on a subnet:
    nmap 10.0.0.0/24 -sn → find live hosts, then nmap -sV -p 22,80,443 <host> for details.
  • When ICMP blocked:
    nmap -Pn -p 1-1000 <host> → skip discovery, probe ports directly.
  • Stealth check in an IDS lab:
    nmap -T1 -sV <host> → slow timing to reduce IDS noise.
  • Full noisy recon in a lab environment:
    nmap -A -T4 <target> → quick comprehensive view.

Closing — don’t memorize blindly

The exam question isn’t “what flag is X” — it’s “which flag solves this problem.” Memorize the purpose and practice applying them in labs. Over the coming weeks I’ll publish deeper examples for each of these switches, show script usage, and map Nmap output to real exploitation workflows.

The Best Way to Perform a High Bar Back Squat and Enhancing Your Clean

The high bar back squat is not only a fundamental exercise for building lower body strength but also an essential component for improving Olympic lifts, particularly the clean. By performing the high bar back squat correctly, you can significantly enhance your clean technique and performance. Here’s a step-by-step guide to mastering this powerful movement, along with insights on how it translates to a better clean.

Setup and Overall Positioning

  1. Bar Placement — place the barbell on the upper traps, just below the base of your neck. It should rest comfortably and not cause any pinching or discomfort.
  2. Grip — Grip the bar slightly wider than shoulder-width. Keep your hands and wrists straight, not bent. Squeeze your shoulder blades together to create a stable shelf for the bar.
  3. Foot Placement — foot placement is key. Stand with your feet shoulder-width apart. Your toes should point slightly outward, roughly at a 15-30 degree angle. This allows for better knee tracking, balance and feeling comfortable as you descend in the squat movement itself.
  4. Bracing and Unracking
    Bracing — Take a deep breath into your belly, not your chest. This helps create intra-abdominal pressure to support your spine. Brace your core as if you’re preparing to get punched in the stomach.
  5. Unracking: Stand up tall to lift the bar off the rack. Take a step back, ensuring you have enough space to squat without hitting the rack.
  6. The Descent — Initiate the Movement: Begin by pushing your hips back slightly, then bend your knees. Think about sitting down rather than straight down. Keep your chest up and eyes forward to maintain a neutral spine.
  7. Depth — Squat down until you feel your hamstrings on the back of your calves. Or, at least squat down far enough where your hip crease is below parallel to your knee joint. The best knee position is when your knees track inline and pass over your toes throughout the descent. Avoid letting them cave inward by actively pressing ‘knees out.’
  8. The Drive UP — Push through your entire foot, not just your heels. Engage your quads, glutes, and hamstrings to drive the weight upward.
  9. Hip and Chest Position — Keep your chest up and your hips under the bar as you rise. Avoid tipping forward by squeezing your glutes to help push hips through to full hip extension.
  10. Breathing — one big deep breath when you go under and lift the bar out of the rack. Step back one step and take one more or max two breaths and brace your trunk and squat. Exhale as you pass up through the most challenging part of the lift (usually just above parallel). Continue to breathe steadily as you return to the starting position.
Team aggressive tempo at crossfithui.com

Common Mistakes to Avoid
Knees caving in? If your knees tend to cave inward, it’s usually a sign of weak glutes and/or poor motor control. Also, if your knees cave in on the way up try to focus on pushing your knees out on the way out of the bottom.

    Heels lifting off the ground? If your heels lift off the ground, it’s usually indicative of a lack of calf and/or ankle mobility. Sometimes you can just be too far forward on the way down or coming out of the bottom. Always be sure your weight is evenly distributed through your entire foot.

    Also, if you have an excessive forward lean focus on keeping your chest up and facing forward while maintaining your lumbar curve. One way to help combat this is to work on weighted back extensions, death marches or other exercises to help build a strong lower back/spinal erectors.

    Tips for Improving Your Squat Range of Motion (ROM)

    The first thing is to have a general as well as a movement specific warm-up.

      Always warm up before squatting with dynamic hamstring and quad stretches, calf/ankle mobility and bodyweight squats can help prepare your muscles and joints. Always remember to warm up the movement you plan on doing with the movement itself.

      How High Bar Back Squats Improve Your Clean

      Enhanced Leg Strength:
      The high bar back squat primarily targets the quadriceps, glutes, and hamstrings, all of which are crucial for generating the explosive power needed in the clean. Stronger legs enable a more powerful drive during the clean pull and a more stable catch position.

      Improved Squat Depth:
      Regularly performing high bar back squats helps you achieve greater squat depth. This translates to a deeper and more secure receiving position in the clean, allowing you to catch heavier weights with stability and confidence.

      Better Postural Strength:
      Maintaining an upright torso during high bar back squats strengthens the muscles of the upper back and core. This is essential for keeping the barbell close to your body during the clean and maintaining a strong, upright position when receiving the bar.

      Enhanced Mobility:
      The high bar back squat demands and improves flexibility in the ankles, hips, and thoracic spine. Enhanced mobility in these areas allows for a more efficient and comfortable receiving position in the clean, reducing the risk of injury and improving overall performance.

      Transferable Movement Pattern:
      The high bar back squat closely mimics the squat position in the clean. By ingraining the correct movement pattern through squatting, you reinforce the motor skills needed for a successful clean. This includes proper knee tracking, hip engagement, and core stability.

      Increased Confidence Under the Bar:
      Regularly handling heavy weights in the high bar back squat builds mental and physical confidence, which is crucial when performing the clean. Knowing that you can squat a particular weight gives you the assurance to pull and catch that weight during your clean attempts.

        In conclusion the high bar back squat is a powerful exercise for building strength and improving athletic performance, especially in Olympic lifts like the clean. By following these steps and focusing on proper technique, you can maximize your gains and reduce the risk of injury.

        Remember, quality over quantity is key. Master the form first, and the strength and skill will follow.

        Happy lifting!

        CompTIA Pentest+ and the CEH exam in the works + some fitness follies

        Well, well, well, the world has changed a lot since my last post. Definitely have a lot of irons in the fire as the old saying goes. Currently working on the PenTest+ certification from CompTIA. I’ll be following that up with the CEH exam. Between those two certs I’ll be working on and getting the ISACA’s Cybersecurity Audit Certificate. 2024 is shaping up to be another great year!

        Hit a new deadlift PR at 521/237

        Playing a little catchup

        A lot has been going on over the last 6 months or so. One of the primary things is that I’ll be doing is taking the ISC(2) Certified Cloud Security Professional exam on 4 NOV.

        What does the CCSP cover you might ask?

        Domain 1 covers architecture, concepts, and design. Domain 1 also includes cloud computing concepts which covers broad network access, on-demand services, resource pooling, rapid elasticity, multi-tenancy and more. It also includes cloud service models, IaaS, storage types, volume storage, object storage, PaaS, storage types and more.

        The cloud service deployment model covers public cloud, private cloud, hybrid cloud, community cloud, management plane, and virtualization.

        The things that are covered in the rest of Domain 1 are:
        Security aspects of virtualization – Type 1 and Type 2 hypervisors.
        Principles of secure cloud computing – covering roles and responsibilities, design principles and Identity and Access Management (IAM).

        Design requirements – covering requirements analysis, functional requirements, inventory, valuation and more. Cloud model boundaries were also covered as well as the cloud service models, IaaS, PaaS and SaaS. Protecting sensitive information portion covered hardening, encryption, layer defense, common threats, secure data life cycles and more. And finally, the Threat Modeling portion of Domain 1 includes STRIDE, DREAD, the OWASP Top 10 security threats and the CSA Top 9 risks.

        I’ll outline Domain 2 tomorrow along with some other important details.

        Ive also been able to make back to CrossFit on a regular basis. Ive also been able to get out on the water a little more often and once I pass this exam in November I’ll take a couple months off and then at the beginning of the year go ALL IN on Heath Adams Practical Network Penetration Testing certification. After that I will take a nice long break from taking certification exams.

        Today as a break from studying I took a nice long walk and I found this cool writing spider along the way.

        Nice easy two hour stroll through the eastern pinelands
        Our old friend the writing spider

        And, it’s kind of fitting that I haven’t posted any sort of lifting videos in…forever, and when I finally get back to training that I end up posting a lifetime PR for my deadlift at 517#. Easy day.

        lifting is the source

        Until next time…