Making Your Home "Smarter"
Like many people over the past year-and-a-half, we have been working on home improvements since the early weeks of quarantine. During most of our planning and research, I have been looking into additional Smart home items.
In our home, we have a thermostat that can be changed and programmed extensively through…
Mobile Devices and Your Network's Security
The iPhone 8 was recently released, the iPad production train keeps rolling, but Android devices still have their fair share of the market. In an age where technology and business rarely spend any time apart, think of all the devices you use.If you are a business owner, what devices…
As a business professional, you have a responsibility to ensure that your company’s network and data is protected from hacking attacks. It can be difficult to remember to take all of the necessary precautions, but with our help, you can easily outline all of the measures that should be taken to maximize security for corporate…
President Obama's implication that the government should never have an issue accessing a person's data comes an even scarier viewpoint: being the victim of a search warrant just because you take steps to enhance your privacy.As it happens, that could become the reality if the FBI gets its way. While it's no secret that government agencies spy…
A pair of healthcare organizations have agreed to pay a combined $4.8 million to settle charges that they potentially violated the Health Insurance Portability and Accountability Act of 1996 (otherwise known as HIPAA). The charges were the consequence of a data breach in which protected health information of thousands of patients was compromised.An investigation into…
No one except the NSA knows which 50,000 networks it injected data-thieving malware into, so what's a cautious enterprise network manager to do? It's business as usual. However, what's "usual" these days is vigilance - continuous monitoring and analysis to uncover unusual patterns and proactively respond.
"It is important to adopt protective processes that continuously couple…
An e-mail claiming to be from the Chinese Ministry of Defense actually contains a piece of malware that exploits a hole in Microsoft office, says Trend Micro.Government agencies across several countries are on the hit list of a targeted cyber attack according to security vendor Trend Micro.Officials at agencies across Europe and Asia have been…
The answer to this is question is ultimately no. That being said what’s the point of securing your network? Well, if a network is properly secured it will take a very skilled individual to successfully break into a secured network.Network security is a must for every business whether you have your own server or not.…
In the past months especially attack attempts on corporations and home users alike have been on the rise. With large corporations like Sony, Google, and even RSA, a company whose business is network security, how are you supposed to defend your company and its intellectual data? Well according to many articles out that talk about…