Even before the coronavirus pandemic and the changes it quickly forced on the way we work, IT managers and cybersecurity strategists had already observed a rise in Social Engineering, the latest cyber threat to businesses. The most critical of cyber dangers does not start with malware by any means. Instead, social ...
October 20, 2020Tommi
The term "edge" alludes to bringing computing infrastructure closer to the origin of data. The distributed framework processes data near the originating data source conceivable to reduce latency and bandwidth use. Think of a self-driven car that needs to make multiple decisions at the same time, and most of which while ...
October 5, 2020Chris Torbit
The widespread impact of the coronavirus pandemic has changed the way we all live our lives. Millions of people worldwide are now working virtually. Even before COVID-19, there had been debates about the future of working remotely. Now, there are more questions about “Business Unusual,” and if it has come ...
October 4, 2020Chris Torbit
Ransomware - a new form of malware - is becoming an increased threat for businesses of every size. Ransomware is a version of malware that targets and encrypts a company's data and a ransom is demanded from the cyber criminals in order to obtain the decryption key to unlock our ...
October 9, 2019Chris Torbit
There's a lot of buzz in IT circles, today, around the idea of "Intent Based Networking" or IBN. But what exactly is "Intent Based Networking" and how can it benefit today's modern organizations? Because of the significant advances in machine learning algorithms, intent based networking could soon be a reality in ...
April 24, 2019Chris Torbit
No matter how much a company spends on technology and equipment, those solutions are not meant to last forever and have an anticipated lifecycle. Even after significant investments in technology in your organization, you may have noticed that those solutions are no longer as effective as they once were. Competitors ...
April 18, 2019Chris Torbit
Penetration testing, also referred to as "pen testing" or "ethical hacking", is the process of testing a computer network, application or computer system to identify security issues that could be exploited by a cyber attacker. This testing is also referred to as a "white hat attack" because in a pen ...
April 10, 2019Chris Torbit
DNS hijacking, also referred to as DNS redirection, is a specific type of cyber attack, wherein a "bad actor" can redirect queries to a domain name server, by overriding TCP/IP settings often by hacking and modifying a server's settings. DNS hijacking is frequently used for phishing - displaying fake versions ...
April 3, 2019Chris Torbit
Machine Learning in business can help improve operations and provide meaningful insights on how customers and prospects are interacting with your company. AI (Artificial Intelligence) tools and numerous machine learning algorithms have become increasingly popular in the business community. Multiple factors, such as easy availability of complex data, less expensive ...
March 27, 2019Chris Torbit
One of the most popular buzzwords in tech today is the "Internet of Things" (IoT) but what exactly is it referring to? This week, we'll explain the very basics of IoT and how it will continue to transform the way we communicate and conduct business in the 21st century. The phrase ...
March 19, 2019Chris Torbit