Blog

Malware

Uncategorized

27 Jun 2018

Be Aware of Malware

Cybersecurity is a growing field in this developing technology era; it is something that any organization has to pay attention to because of the many cyber threats present in today’s society. Read the following blog post written by Chris Brook for Digital Guardian about potential, and very destructive, malware threats.
smartphone

Uncategorized

21 Jun 2018

The top security threats to smartphones – Part 3

In this post, we continue our series on the top threats to Smartphones in 2018, with a brand-new kind of cyber threat:  Ransomware.
Smartphone

Uncategorized

4 Jun 2018

The top security threats to smartphones – Part 2

In this post, we continue our series on the top threats to Smartphones in 2018. Here is what you need to know about Network Spoofing and Phishing Attacks.
Pillars

Uncategorized

23 May 2018

Pillars of a secure organization

Columns, or pillars, have been an architectural staple since as early as 2600 B.C. Every significant civilization of the Iron Age (1300 B.C. to 100 B.C.) used pillars in their architecture. Even to this day, in many instances, those pillars of the Iron Age have proven to withstand the test of time.
heavy phone usage

Uncategorized

17 May 2018

The top security threats to smartphones

What are the top threats to smartphones in 2018?  There are many of them, and we will be examining them in detail over several blog posts.  We begin with Data Leakage and Unsecured Wi-Fi Hotspots.
World Data

Uncategorized

2 May 2018

Five tips to avoiding a data breach

Small business owners always have a lot on their minds. They are consumed by thoughts about delivering great customer service and keeping products and services on the cutting edge to keep up with competitors.
Face the music

Uncategorized

26 Apr 2018

Time to face the online learning music

The phrase, “time to face the music” started appearing in American literature and verbiage in the mid-19th century. The origin of this phrase is unclear, but there are two good possibilities. The first likely origin came from the tradition of a disgraced military officer being drummed out of their regiment. The second theory is that it’s referring to the moment before an actor would go on stage and face the orchestra pit.
keys

Uncategorized

16 Apr 2018

An introduction to the public key infrastructure

Just using Private Keys is no longer the norm in cryptography today – using a combination of both Public and Private Keys is, and it’s known as “Asymmetric Cryptography.” A type of Asymmetric Cryptography that is deployed widely today is known as the “Public Key Infrastructure,” or PKI for short.
Infrastructure

Uncategorized

3 Apr 2018

An introduction to public and private keys

As discussed in a previous blog post, cryptography is the science of scrambling and unscrambling a message while it is in transit.  The primary purpose of this is to keep the message content safe, in case it is intercepted by a malicious third party.
Classroom

Uncategorized

28 Mar 2018

Are college students prepared?

For many, a college education is a goal never to be realized. For others, the college education is achieved, but their potential isn’t fully unlocked. When someone graduates from college, are they really prepared for the workforce?
Cyberattack

Uncategorized

20 Mar 2018

An introduction to cryptography

Cryptography dates all the way back to the times of Julius Caesar.  In the simplest terms, the science of cryptography is the scrambling and unscrambling of written messages between two individual parties.
Ransomware

Uncategorized

7 Mar 2018

Five tips to avoiding ransomware

A recent blog post reviewed what Ransomware is, how it is deployed, and the types of attacks that can occur.  Essentially, it is a type of cyber-attack that can lock up your computer screen, your mission critical files, and the data that your company depends on daily.