Missing Work Due to Bad Weather: Don’t Let a Snow Day Shut Down Your Small Business

When the list of school, business and church closings starts scrolling across the bottom of your television screen, you know what that means. Tomorrow’s going to be a snow day.

If you’re a large company, you’ve likely got your inclement weather policies in place and will, literally, weather the storm just fine. But small businesses, let’s say ones with 50 or fewer employees, may not have a hard and fast policy when it comes to missing work due to bad weather. Continue reading “Missing Work Due to Bad Weather: Don’t Let a Snow Day Shut Down Your Small Business”

Securing SkyNet: The Future of Encryption Technology

I have friends that aren’t into movies and even they know the plot to the Terminator movie franchise. Humans develop artificial intelligence, SkyNet, and put it in charge of America’s military arsenal. Skynet decides we’re the threat so it nukes the planet and rules the remaining human population until they overthrow it.

What seemed so futuristic in 1984 doesn’t seem so far away now. We have made some serious advancements in Robotics, Cybernetics and even the vaunted Artificial Intelligence realm. Continue reading “Securing SkyNet: The Future of Encryption Technology”

What Does AES Encryption Mean for Your File Sharing? An Introduction to Encryption

The average data breach costs a company $4 million dollars. Behind the price tag lies countless hours lost, administration and management strain and flagging credibility. Today, to avoid those risks, businesses and agencies are turning to enterprise-grade file sharing, where they see a lot of jargon. We’re here to help with some of that today, specifically, what does AES encryption mean? Continue reading “What Does AES Encryption Mean for Your File Sharing? An Introduction to Encryption”

From Traffic Direction Services to Geo IP Lookups: How Cybercriminals Are Tailoring Their Attacks

Cybercrime is a big business and it is costing law-abiding citizens tens of millions of dollars a year. CryptoLocker, one of the more high-profile strains known as ransomware, is believed to have netted its shadowy operators $3 million alone.

Now, cybercriminals have upped the game by using a range of methods to find out where you and your business are located and tailoring their malware for maximum effect. Continue reading “From Traffic Direction Services to Geo IP Lookups: How Cybercriminals Are Tailoring Their Attacks”

Creative Destruction: The Paradigm Shift in Technological Thinking

Paradigm shifts happen to most of us throughout our lives. We believe one thing to be true, but with new information gathered and embraced, our view of the world can change to become a new reality.

We can almost reinvent ourselves time and again if we’re willing to be open to concepts and ideas. So, it’s in this vein that we consider how the technology industry is perpetually going through paradigm shifts with increasing frequency. Continue reading “Creative Destruction: The Paradigm Shift in Technological Thinking”

You’ve Been Breached! What Now?

Unless you’ve shunned modern society or are under the age of five, there is a good chance you’ve heard of a very public organization or company being hacked or breached. Home Depot, Target, Blue Cross, Marriot and the DNC are just a few examples of some big names going through the unfortunate process of having to clean up a technological mess.

Sometimes the breaches are huge, spilling out millions of people’s sensitive data and sometimes they’re small and easy to fix. Whatever the size and impact of the breach, businesses still must attend to them.

How should businesses who suspect a possible breach respond or act in this situation? Let’s find out! Continue reading “You’ve Been Breached! What Now?”

Intellectual Property Theft Cases: Examining the Technology Industry

Two of the most expensive crimes, counterfeiting and piracy, cost companies as much as $630 billion per year. Intellectual property (IP) is the lifeblood for many companies in the IT and High Tech industries, yet steep competition with foreign countries and other key competitors leads to sabotage, risk and theft. No need to go to the library and check out a mystery novel, corporate theft is writing its own thriller.

Verizon conducted a study in 2012 that named the information and technology industry one of the top three verticals targeted by IP thieves. Though their motives vary, most thefts occur because opponents seek strategic, technological or financial advantages. In fact, according to the 2016 report, 34% of attacks are typically motivated by financial gain. Continue reading “Intellectual Property Theft Cases: Examining the Technology Industry”

A Taste of Armageddon: The Rise of Denial of Service Attacks

Denial of Service-as-a-Service is a booming business with many buyers and sellers. Virtually anyone with a little computing knowledge, some money and a target in mind can do serious damage by stopping communications and commerce for whoever their efforts are directed at. Right now, we are living in the age of Denial-of-Service (DDoS).

There have been plenty of truly excellent articles on this topic from nearly every tech publication on this subject. Google this subject and you’ll find out what it is, who is doing it, and how to prevent or mitigate the various types of DoS attacks. Forbes even did a piece on what these attacks mean for businesses and entrepreneurs.

So, why even bother to write about this topic? That’s easy. The rising undercurrent of cyberwarfare at the infrastructure level is something few are talking about. DoS attacks are possibly the prelude to deeper, more aggressive attacks that will do more than prevent data from moving within the infrastructure. Let’s examine the evidence that points to the beginning of a new era of public virtual combat. Continue reading “A Taste of Armageddon: The Rise of Denial of Service Attacks”

Stopping the Signal: Is it Possible to Shut Down Wikileaks?

At this point, I think even people living in caves know what WikiLeaks is. Good or bad, the information contained in WikiLeaks sheds light on the inner workings of both governments and corporations alike.

Recently, it was proposed that certain parts of the Internet be shut down to combat ISIS and its cyberterrorism recruitment campaign. While the full extent of that remark was unclear, the notion of shutting down parts of the Internet to prevent access from a group like ISIS has been universally scoffed at by cybersecurity and infrastructure experts worldwide. Continue reading “Stopping the Signal: Is it Possible to Shut Down Wikileaks?”