Edge Computing and the Future of IoT

As the Internet of Things (IoT) begins to take shape and its future becomes clearer, IT experts realize that mainstream cloud computing isn’t enough. It’s not fast enough to handle real-time data streaming applications, and it’s not efficient enough to meet evolving technological demands. But developers are exploring a possible solution in the form of…

Details

Next Gen Firewalls

All firewalls are not created equal. To understand that, you need to know what the idea behind a basic firewall is. A firewall from the IT perspective is some hardware or software implementation that is meant to restrict incoming or outgoing network traffic. Most desktop operating systems as well as servers have some sort of firewall protection already built into the operating system. While these type of firewalls protect the machines they are running on, hardware firewalls/appliances will protect these machines as well as the rest of the hardware that exist on the network.

Details

Cloud Computing Basics

At its simplest level, cloud computing means using someone else’s computer. This gives you rapid access to computing power, storage, and network services that can help you scale your operation up or down, depending on your requirements.

Cloud is a technology buzzword with many meanings. Dropbox is cloud. Microsoft Office 365 is cloud. Salesforce is cloud. Any software that you access via the Web is technically cloud. ‘Cloud’ is so prominent in today’s technology industry lexicon, that it is hard to remember a time without it.

Details

The 411 on VDI – Virtual Desktop Infrastructure

VDI Brief

As the use of Hyper-Convergence technology spreads throughout the industry, desktop virtualization has followed in this lead because HCI is a great platform for execution. Three of the main VDI players at this time would be Citrix, VMWare, and Microsoft. What is great about VDI, is that you are not necessarily tied to one specific vendor. For Example, your broker could be provided by Citrix, while the backend infrastructure could be provided by Microsoft, or VMWare. One thing to know about VDI is what it is not. It is not just the virtualization of desktops. It’s essentially a whole infrastructure based on supplying the desktop experience to the end user without necessarily having a desktop.

Details

BYOD and Securing It to Protect Your Organization

BYOD, which stands for bring-your-own-device, is an important concept. With its supporting technologies it is accelerating telecommuting and collaboration in the workplace at a rapid pace. When selecting a BYOD strategy it is important to focus on some key areas. Understand your users’ needs. Establish clear policies. Define the discovery and enrollment process. Customize the…

Details

Tips to Begin a Cybersecurity Career

I have worked in the cybersecurity space for about 14 years now. I found my way into cybersecurity from being a network engineer who needed to fill a technology gap on my then team – as a security subject matter expert.

I have been approached over the years by folks looking to begin a career in cybersecurity and/or gain a much deeper appreciation of this field. There are many reasons for these inquiries and it’s not necessarily for the paycheck alone. It’s a role that comes with an incredible amount of responsibility and brings immense value to any organization. I know that for myself, helping organizations better secure their business assets, and as such- their overall business, makes me feel a sense of gratitude and accomplishment for my investment in time and experience to learn this craft.

Details

The Low Down on the CPU Vulnerabilities

As you’ve probably already noticed a few highly dangerous CPU vulnerabilities have been released that effect the CPU at a hardware level. Since this is base off the hardware itself all operating systems (Windows, Linux, Android, macOS) need to protect against it. This means patching their operating systems to mitigate against the threats that the Intel CPU’s have introduced. Now before you run out and grab the latest patch from the OS vendors be warned. There’s a possibility that this could actually cause negative performance on your system and include system crashes.

Details

Exchange Online – Are You Ready?

Are you looking to implement a new email system or to migrate from an old version of Exchange to the most current? If so, you may want to look at implementing it in Exchange Online. Exchange online, not to be confused with Office 365, or Microsoft 365, would be the online version of Exchange hosted by Microsoft. Options are always good, and with Exchange Online you have a few. This path may not be the answer for all types of businesses, but it bears looking into.

Details

Schools are Under Attack

Many hackers are opportunistic predators and will slide to the lowest common denominator when preying on their next victims. Over the past year we’ve seen hackers direct their attention to the education sector; particularly K-12. It’s always appalling when children are taken advantage of in any manner and having their data stolen, ransomed, or leaked is no different. These children are the youth of our nation and have no sense of what’s happening to the privacy of their personal data. These breaches could have long term ramifications on children long before they’ve even applied for college or been given a driver’s permit. We live in an age now where hackers will look to disrupt and take advantage of anyone to benefit their own cause. There is no honor among thieves.

Details

How Big Data Will Change the Criminal Equity Framework?

The definition of Big Data is usually that which refers to the practise of accumulation of extraordinary Big Data from a variety of different sources and then converting that data towards learning new data or towards supply of valuable services.

Big Data has been used by private organizations for a long time. Retailers utilize it to decide client conduct and influence shopping propensities. Insurance agencies depend on Big Data to endeavor to figure out who the most secure drivers and most advantageous individuals are. And a wide range of organizations purchase and pitch this information to each other, trying to dig it for data about their clients that they can use for monetary preferred standpoint.

Details

WannaCry Biggest Test of the Year, Says UK’s National Cyber Security Centre

The NCSC (National Cyber Security Centre), which completes one year, has made this observation in its first annual review.

The NCSC was launched in October 2016 with an objective to help UK’s “…critical services from cyber attacks, manage major incidents, and improve the underlying security of the UK Internet through technological improvement and advice to citizens and organisations.” The National Cyber Security Centre supports critical organizations, the public sector, industry and small and medium enterprises (SMEs).

Details

Securing our Critical Infrastructure – What You Need to Know

The Internet powers the United States’ critical infrastructure. Every day, Americans connect to the national grid without realizing it. Consumers use their smartphones, tablets, and computers to conduct online banking or place an online medication order using a medical insurance provider, for example. Similarly, truckers, chemists, politicians, and others all interact with the U.S. critical infrastructure whenever they connect to their companies’ networks.

Details

Podcast: National Cyber Security Awareness Month (NCSAM)

  Helpful Links: National Cyber Security Awareness Month – Information, events, content, blogs, and infographics Cybersecurity in the Work Place Infographic – Every business faces cybersecurity challenges, no matter the industry or size. Take these steps to proactively protect your customers, employees and intellectual property – and by extension your business’ reputation and success.  

Details

Break into an Information Security Career

National Cyber Security Awareness Month week 4 theme is: The Internet Wants You: Consider a Career in Cybersecurity. Considering the cybersecurity skill shortage, (Frost & Sullivan and (ISC)2 found that the global cybersecurity workforce will have more than 1.5 million unfilled positions by 2020) we should be encouraging students to enter into a cybersecurity career.  However,…

Details