Main Logo

cybersecurity

Classroom

Are college students prepared?

For many, a college education is a goal never to be realized. For others, the college education is achieved, but their potential isn’t fully unlocked. When someone graduates from college, are they really prepared for the workforce?

Ransomware

Five tips to avoiding ransomware

A recent blog post reviewed what Ransomware is, how it is deployed, and the types of attacks that can occur.  Essentially, it is a type of cyber-attack that can lock up your computer screen, your mission critical files, and the data that your company depends on daily.

Mind The Gap resize   scaled

Minding the IT skills gap

The curvature at the edge of a London Underground platform, and the shape of the underground trains, leave a significant gap that could prove dangerous for passengers. For years, drivers and station attendants had the job of making sure passengers watched out for that space, or gap.

Incident response team

Breaking down what incident response means for your business

In today’s world, Cyber-attacks are becoming the norm – no business or corporation is immune to them.  It seems that no matter what an entity does to fortify its defense perimeters, the hacker will find a way to circumvent it and inflict as much damage as possible.  There are no geographical or industrial constraints, anything is fair game.

Ransom

Ransomware, what is it?

In today’s world, Cyber-attacks are becoming much more covert and sophisticated in nature.  Gone are the days when an attacker was content with simply deploying a Trojan Horse virus to secretly see what is going on in your computer.  They are now bent on a destruction of the end user’s machine, and even launching Botnet style attacks in order to infect and destroy thousands of other computers in the process.