An introduction to cryptography

Cryptography dates all the way back to the times of Julius Caesar.  In the simplest terms, the science of cryptography is the scrambling and unscrambling of written messages between two individual parties.

Five tips to avoiding ransomware

A recent blog post reviewed what Ransomware is, how it is deployed, and the types of attacks that can occur.  Essentially, it is a type of cyber-attack that can lock up your computer screen, your mission critical files, and the data that your company depends on daily.

Minding the IT skills gap

The curvature at the edge of a London Underground platform, and the shape of the underground trains, leave a significant gap that could prove dangerous for passengers. For years, drivers and station attendants had the job of making sure passengers watched out for that space, or gap.

Breaking down what incident response means for your business

In today’s world, Cyber-attacks are becoming the norm – no business or corporation is immune to them.  It seems that no matter what an entity does to fortify its defense perimeters, the hacker will find a way to circumvent it and inflict as much damage as possible.  There are no geographical or industrial constraints, anything is fair game.

Ransomware, what is it?

In today’s world, Cyber-attacks are becoming much more covert and sophisticated in nature.  Gone are the days when an attacker was content with simply deploying a Trojan Horse virus to secretly see what is going on in your computer.  They are now bent on a destruction of the end user’s machine, and even launching Botnet style attacks in order to infect and destroy thousands of other computers in the process.

The cybersecurity analyst certification

One of the hottest certs in Information Technology is the Cybersecurity Analyst, also known as the *CySA+.

What makes the CySA+ cert unique is that it is not generalist; rather it focuses on the analysis of threat data.  For example, IT professionals who aspire to get this cert typically must perform at least three major tasks in their job-related duties. 

The top five IT certifications of 2018

A couple of weeks ago, we posted a blog that examined the benefits of making New Year’s Resolutions to further advance your career with IT Certifications. If you have taken our advice, the next step is deciding which specific certifications to get.  This can be a daunting task, as there are so many to choose from.

What is virtualization?

We all have heard about the Cloud, for the most part. It’s this neat little place where you can store data and get software applications for a fraction of what it would normally cost at the retail level.  But there are other terms that get used with the Cloud that cause confusion.  One of these terms is “Virtualization”.

2018: New year, new cyber threats

The most popular word in the world right now, in all its forms, is “new.” New Year, new resolutions, new exercise regiment, new weight, new goals, new toys…you get the picture. 2018 brings with it the excitement of new beginnings, but with that also comes the dread of new threats. Some of the most dangerous threats our world will face this year will be cyber threats.