The Latest in Tech Today

Cyber War isn’t Coming It is already Here!

Cyber War isn’t Coming It is already Here!Wars today are less likely to be kinetic, and it is safe to assume that the primary mode of retaliation from Iran will be a cyber attack. Iran wants to bring down the U.S., and the fastest way to do that is to damage us...

read more
How Mature is Your Insider Threat Intelligence?

How Mature is Your Insider Threat Intelligence?

How Mature is Your Insider Threat Intelligence?Are insiders a threat to your business? How would you know? Today it is necessary for companies to establish a robust insider threat program that can detect employee-created risk and respond accordingly but keeping...

read more

Zeroing In On our Industrial Control Systems

Zeroing In On our Industrial Control Systems The country of Iran has been recruiting and training an army of cyberhackers and developing digital tools that can disruptively sabatoge entire computer networks.  Now they are focusing their efforts on SCADA systems often...

read more

Hackers Preying on Old and Decrepit Technology

Hackers Preying on Old and Decrepit TechnologyCybercriminals will innovate when necessary. However, more likely, like any successful enterprise, they will harvest any low-hanging fruit when and wherever they can find it. For those of us with unpatched older vulnerable...

read more

Cloud Migration Considerations to Take into Account

Cloud Migration Considerations to Take into Account ​Deciding to move to business technology services to "the Cloud" is one of the most significant that is made by business leaders, and it is a decision best not made without the approval at the highest level of the...

read more

Intermittent Fasting and its Perks

Intermittent Fasting and its PerksFat loss is an excellent reason to fast, but it isn't the only benefit of fasting. Intermittent fasting makes your day simpler. Intermittent fasting helps you live longer. Intermittent fasting may reduce cancer risks. Intermittent...

read more

Pesky Apps That You Need To Delete ASAP

Pesky Apps That You Need To Delete ASAPNot all Apps are Good Apps...   Depressive Apps. With everyone curating an unrealistic, heavily manufactured, idealized version of their lives, we all start to believe other people's lives are so much better than our own. It...

read more

The New World Owners — Influencers

The New World Owners -- InfluencersIn twelve years, our President may be a Youtube star! Oh -- let us hope not. Did you know that most of today's influencers are just single person start-ups? What makes them unique is their ability to spot trends and then experiment...

read more

Biological Warfare Against Chinese Pig Farmers.

Biological Warfare Against Chinese Pig Farmers. A bizarre battle between pig farmers and criminal gangs is happening in China. Farmers began using anti-drone technology to stop gangs of criminals from infecting their livestock with diseases that have killed more than...

read more
Security – Knowing What You Have Is Essential

Security – Knowing What You Have Is Essential

Security - Knowing What You Have Is Essential   One of the most important things that a business can do to reduce their cybersecurity risk is to know what assets they have, where those assets are, who has access to those assets, how those assets are accessed....

read more
Are You At Risk from Your Outsourced Software Provider

Are You At Risk from Your Outsourced Software Provider

Are You At Risk from Your Outsourced Software Provider   The "Cloud" is the eponymous name given for a computer server that belongs to another person or company that you have no control over. There are many companies who offer computing services to businesses...

read more
5G – Not Ready For PrimeTime…Yet!

5G – Not Ready For PrimeTime…Yet!

5G - Not Ready For PrimeTime...Yet!   Technology is ever-changing, and new and improved technology is consistently released and models refreshed or introduced. The next significant advancement coming our way will be in cellular technology and the launching of 5G...

read more
Business Computers Should Only Be Used For Business

Business Computers Should Only Be Used For Business

Business Computers Should Only Be Used For Business   If an employer provides you with equipment, they expect that the computer to be used for work and work only. Many times there will be software installed on these devices that monitors your activities and...

read more
Apple:1 Android:120

Apple:1 Android:120

Apple:1 Android:120   Android is not Android is not Android.  That means that there are many many versions of the operating system that must be updated and it is why most Android devices are sorely out of date with security patches and operating system updates. ...

read more
Smart TVs, Security and the FBI

Smart TVs, Security and the FBI

Smart TVs, Security and the FBI   Did you go out on Black Friday and pick up a new television for the family?  Chance are it was a “Smart TV.” Many TV manufacturers have jumped on the internet connected bandwagon to produce more convenience by including one-stop...

read more