Blog

Cloud course

Uncategorized

6 Nov 2018

The three types of cloud platforms

Our last post examined the top five advantages of using the Cloud, and what it means to your business as well as bottom line. In this blog, we review three various Cloud Deployment Models:

Uncategorized

9 Oct 2018

Scammers Are Getting More Clever

Many people think they are exempt from being scammed; however, that is not the case! Scammers are becoming more and more clever in their schemes, and we all need to become more aware of these hurtful practices. No one is safe when it comes to falling victim to scams. Krebs on Security discusses how many industry professionals are getting tricked by scammers through phone calls in his blog titled “Voice Phishing Scams Are Getting More Clever.”
Virtualization

Uncategorized

26 Sep 2018

A new introduction to virtualization course

The IT Infrastructure, as we know it today, is quickly moving away from being an “On Premises” model to a Cloud-based model.  The benefits of the Cloud are obvious, such as fixed and affordable pricing, scalability, on demand products and services, etc.  A critical component of any Cloud platform is that of “Virtualization.”
Cyber Crime

Uncategorized

20 Aug 2018

An FBI warning on ATM cashout attack

Brian Krebs, on his blog Krebs on Security,  shares a warning to all consumers; the FBI has warned banks of an “unlimited operation” run by cyber criminals.
Data security

Uncategorized

8 Aug 2018

Data loss prevention – Part 2

Our last post examined the important concepts of what Data Loss Prevention (DLP) is.  In this post, we now examine the required controls that are needed to safeguard these datasets, as well as the important features you need to look out for as you pick a particular DLP solution for your business.
Adobe girls laughing in computer class scaled e

Uncategorized

1 Aug 2018

Trends in online education in 2018

Online education is continually growing in the United States. Many experts have conducted research on the progression and direction of online education. USNews reported on this flexible alternative to traditional college courses by stating four trends that students should watch out for in 2018.
Data security

Uncategorized

25 Jul 2018

Avoiding card skimmers at the pump

Many of us have heard of fuel dispensers being a target for card-skimming devices.  Brian Krebs wrote a post on his blog “Krebs on Security” on how to avoid these card skimmers, and he uses the San Antonio Police Department as a source for tips. Some of these tips include using only new fuel dispensers that have a horizontal card slot accompanied by a raised metal keypad and using only credit cards at the pump. To read the rest of his great post, check out the link above.
Data loss prevention

Uncategorized

20 Jul 2018

Data loss prevention – Part 1

To any business or corporation, information and data are the blood flow of daily operations.  This consists of market intelligence as it relates to your competition, the sensitive customer information (such as contact info, credit card/banking numbers, etc.) and even your own internal data.  Safeguarding all of this data is a must, not only from it being hacked into, but also by making sure that only the authorized employees have access to it.
Virtualization page

Uncategorized

17 Jul 2018

The Future of Virtualization

Server virtualization is a virtualization technique that involves breaking up a physical server into multiple small, virtual servers using a virtualization software. In his post for NetworkWorld called What’s the Future of Server Virtualization, Neil Weinberg describes the benefits of server virtualization and the different types of server virtualization.
Online Education

Uncategorized

12 Jul 2018

What is the Future of Higher Education?

E-learning is continuously growing without an end in sight. More and more students are enrolling in online courses because, quite frankly, they are more convenient. We have all seen the growth of online education in the past few years, but where exactly is it going?
phone security

Uncategorized

6 Jul 2018

Seven Steps to Protect Your Smartphone

Our previous blog posts have examined the various cyber-based threats posed to Smartphones.  In this post, we examine seven steps that you can take to help mitigate those risks:
adidas e

Uncategorized

3 Jul 2018

Adidas Data Breach

Breach of security is a common topic in the news today, especially when it involves compromising the safety of consumers’ private information. Many consumers became more aware of the significant effects of data breaches earlier this year when the Facebook/Cambridge Analytica scandal broke out; although, we have seen many large data breaches in the past.