Ransomware - a new form of malware - is becoming an increased threat for businesses of every size. Ransomware is a version of malware that targets and encrypts a company's data and a ransom is demanded from the cyber criminals in order to obtain the decryption key ...
October 9, 2019Tommi
There's a lot of buzz in IT circles, today, around the idea of "Intent Based Networking" or IBN. But what exactly is "Intent Based Networking" and how can it benefit today's modern organizations? Because of the significant advances in machine learning algorithms, intent based networking could soon be ...
April 24, 2019Tommi
No matter how much a company spends on technology and equipment, those solutions are not meant to last forever and have an anticipated lifecycle. Even after significant investments in technology in your organization, you may have noticed that those solutions are no longer as effective as they ...
April 18, 2019Tommi
Penetration testing, also referred to as "pen testing" or "ethical hacking", is the process of testing a computer network, application or computer system to identify security issues that could be exploited by a cyber attacker. This testing is also referred to as a "white hat attack" because in ...
April 10, 2019Tommi
DNS hijacking, also referred to as DNS redirection, is a specific type of cyber attack, wherein a "bad actor" can redirect queries to a domain name server, by overriding TCP/IP settings often by hacking and modifying a server's settings. DNS hijacking is frequently used for phishing - ...
April 3, 2019Tommi
Machine Learning in business can help improve operations and provide meaningful insights on how customers and prospects are interacting with your company. AI (Artificial Intelligence) tools and numerous machine learning algorithms have become increasingly popular in the business community. Multiple factors, such as easy availability of complex data, ...
March 27, 2019Tommi
One of the most popular buzzwords in tech today is the "Internet of Things" (IoT) but what exactly is it referring to? This week, we'll explain the very basics of IoT and how it will continue to transform the way we communicate and conduct business in the ...
March 19, 2019Tommi
If you've ever considered selling or recycling your old phone or computer, the first step you've likely executed is a "factory reset" to delete all of your personal data from the device. After performing a factory reset, your device is supposed to look like it ...
March 13, 2019Tommi
Windows 7 is quickly approaching it's end of life. After January 14, 2020, Microsoft will no longer provide free security updates or support for computers running Windows 7. And although Microsoft plans to continue to provide a paid support plan for Windows 7 for another 3 ...
March 7, 2019Tommi
Hierarchical structures, known as directories, allow networks to store information about objects. Active Directory Domain Services is a directory service that provides methods for storing directory data and then making it accessible to network administrators and users throughout a company. For example, Active Directory has the ability ...
December 12, 2018Tommi