Blog

Data security

Uncategorized

25 Jul 2018

Avoiding card skimmers at the pump

Many of us have heard of fuel dispensers being a target for card-skimming devices.  Brian Krebs wrote a post on his blog “Krebs on Security” on how to avoid these card skimmers, and he uses the San Antonio Police Department as a source for tips. Some of these tips include using only new fuel dispensers that have a horizontal card slot accompanied by a raised metal keypad and using only credit cards at the pump. To read the rest of his great post, check out the link above.
Data loss prevention

Uncategorized

20 Jul 2018

Data loss prevention – Part 1

To any business or corporation, information and data are the blood flow of daily operations.  This consists of market intelligence as it relates to your competition, the sensitive customer information (such as contact info, credit card/banking numbers, etc.) and even your own internal data.  Safeguarding all of this data is a must, not only from it being hacked into, but also by making sure that only the authorized employees have access to it.
Virtualization page

Uncategorized

17 Jul 2018

The Future of Virtualization

Server virtualization is a virtualization technique that involves breaking up a physical server into multiple small, virtual servers using a virtualization software. In his post for NetworkWorld called What’s the Future of Server Virtualization, Neil Weinberg describes the benefits of server virtualization and the different types of server virtualization.
Online Education

Uncategorized

12 Jul 2018

What is the Future of Higher Education?

E-learning is continuously growing without an end in sight. More and more students are enrolling in online courses because, quite frankly, they are more convenient. We have all seen the growth of online education in the past few years, but where exactly is it going?
phone security

Uncategorized

6 Jul 2018

Seven Steps to Protect Your Smartphone

Our previous blog posts have examined the various cyber-based threats posed to Smartphones.  In this post, we examine seven steps that you can take to help mitigate those risks:
adidas e

Uncategorized

3 Jul 2018

Adidas Data Breach

Breach of security is a common topic in the news today, especially when it involves compromising the safety of consumers’ private information. Many consumers became more aware of the significant effects of data breaches earlier this year when the Facebook/Cambridge Analytica scandal broke out; although, we have seen many large data breaches in the past.
Malware

Uncategorized

27 Jun 2018

Be Aware of Malware

Cybersecurity is a growing field in this developing technology era; it is something that any organization has to pay attention to because of the many cyber threats present in today’s society. Read the following blog post written by Chris Brook for Digital Guardian about potential, and very destructive, malware threats.
smartphone

Uncategorized

21 Jun 2018

The top security threats to smartphones – Part 3

In this post, we continue our series on the top threats to Smartphones in 2018, with a brand-new kind of cyber threat:  Ransomware.
Smartphone

Uncategorized

4 Jun 2018

The top security threats to smartphones – Part 2

In this post, we continue our series on the top threats to Smartphones in 2018. Here is what you need to know about Network Spoofing and Phishing Attacks.
Pillars

Uncategorized

23 May 2018

Pillars of a secure organization

Columns, or pillars, have been an architectural staple since as early as 2600 B.C. Every significant civilization of the Iron Age (1300 B.C. to 100 B.C.) used pillars in their architecture. Even to this day, in many instances, those pillars of the Iron Age have proven to withstand the test of time.
heavy phone usage

Uncategorized

17 May 2018

The top security threats to smartphones

What are the top threats to smartphones in 2018?  There are many of them, and we will be examining them in detail over several blog posts.  We begin with Data Leakage and Unsecured Wi-Fi Hotspots.
World Data

Uncategorized

2 May 2018

Five tips to avoiding a data breach

Small business owners always have a lot on their minds. They are consumed by thoughts about delivering great customer service and keeping products and services on the cutting edge to keep up with competitors.