Blog

Face the music

Uncategorized

26 Apr 2018

Time to face the online learning music

The phrase, “time to face the music” started appearing in American literature and verbiage in the mid-19th century. The origin of this phrase is unclear, but there are two good possibilities. The first likely origin came from the tradition of a disgraced military officer being drummed out of their regiment. The second theory is that it’s referring to the moment before an actor would go on stage and face the orchestra pit.
keys

Uncategorized

16 Apr 2018

An introduction to the public key infrastructure

Just using Private Keys is no longer the norm in cryptography today – using a combination of both Public and Private Keys is, and it’s known as “Asymmetric Cryptography.” A type of Asymmetric Cryptography that is deployed widely today is known as the “Public Key Infrastructure,” or PKI for short.
Infrastructure

Uncategorized

3 Apr 2018

An introduction to public and private keys

As discussed in a previous blog post, cryptography is the science of scrambling and unscrambling a message while it is in transit.  The primary purpose of this is to keep the message content safe, in case it is intercepted by a malicious third party.
Classroom

Uncategorized

28 Mar 2018

Are college students prepared?

For many, a college education is a goal never to be realized. For others, the college education is achieved, but their potential isn’t fully unlocked. When someone graduates from college, are they really prepared for the workforce?
Cyberattack

Uncategorized

20 Mar 2018

An introduction to cryptography

Cryptography dates all the way back to the times of Julius Caesar.  In the simplest terms, the science of cryptography is the scrambling and unscrambling of written messages between two individual parties.
Ransomware

Uncategorized

7 Mar 2018

Five tips to avoiding ransomware

A recent blog post reviewed what Ransomware is, how it is deployed, and the types of attacks that can occur.  Essentially, it is a type of cyber-attack that can lock up your computer screen, your mission critical files, and the data that your company depends on daily.
Mind The Gap resize   scaled

Uncategorized

28 Feb 2018

Minding the IT skills gap

The curvature at the edge of a London Underground platform, and the shape of the underground trains, leave a significant gap that could prove dangerous for passengers. For years, drivers and station attendants had the job of making sure passengers watched out for that space, or gap.
Incident response team

Uncategorized

21 Feb 2018

Breaking down what incident response means for your business

In today’s world, Cyber-attacks are becoming the norm – no business or corporation is immune to them.  It seems that no matter what an entity does to fortify its defense perimeters, the hacker will find a way to circumvent it and inflict as much damage as possible.  There are no geographical or industrial constraints, anything is fair game.
Ransom

Uncategorized

8 Feb 2018

Ransomware, what is it?

In today’s world, Cyber-attacks are becoming much more covert and sophisticated in nature.  Gone are the days when an attacker was content with simply deploying a Trojan Horse virus to secretly see what is going on in your computer.  They are now bent on a destruction of the end user’s machine, and even launching Botnet style attacks in order to infect and destroy thousands of other computers in the process.
it security lock cybersecurity breach alignment  large

Uncategorized

30 Jan 2018

The cybersecurity analyst certification

One of the hottest certs in Information Technology is the Cybersecurity Analyst, also known as the *CySA+. What makes the CySA+ cert unique is that it is not generalist; rather it focuses on the analysis of threat data.  For example, IT professionals who aspire to get this cert typically must perform at least three major tasks in their job-related duties. 
Custers last stand  scaled scaled

Uncategorized

24 Jan 2018

Business cybersecurity: Take a lesson from Custer’s last stand

On June 25, 1876, Lt. Col. George Armstrong Custer started into a conflict he was vastly under-prepared for. That conflict would cost him his life, and half the lives of the entire 7th Cavalry.
Adobe man in computer class scaled scaled

Uncategorized

17 Jan 2018

The top five IT certifications of 2018

A couple of weeks ago, we posted a blog that examined the benefits of making New Year’s Resolutions to further advance your career with IT Certifications. If you have taken our advice, the next step is deciding which specific certifications to get.  This can be a daunting task, as there are so many to choose from.