As we've inched closer and closer to quantum computing, quantum cryptography has become a greater concern. We haven't yet created a quantum computer that's faster than the binary computers we use today, but it's possible that this will change within a few … [Read more...] about Quantum Cryptography Explained: Applications, Disadvantages, & How It Works
In computer science, the concept of network layers is a framework that helps to understand complex network interactions. There are two models that are widely referenced today: OSI and TCP/IP. The concepts are similar, but the layers themselves differ between … [Read more...] about The Network Layers Explained [with examples]
Simply put, network analytics is the practice of using different types of network data to identify trends and patterns. Then, that information is used to make better decisions—troubleshooting decisions, threat remediation decisions, business planning … [Read more...] about Network Analytics: What It Is, How It’s Used, and Who Benefits the Most
In my experience, most conversations on how to protect customer data revolve around active companies. Certainly important, but what about bankrupt companies? That data doesn’t simply disappear when the organization declares bankruptcy. And in many cases, the … [Read more...] about On Protecting Customer Data: What Happens After Bankruptcy?
IT budgets require a lot of thought, but the process of planning, organizing, and presenting your budget doesn’t have to be painful. In fact, a well-developed IT budget can be a focused road map for your IT strategy. You'll avoid “wish list” budgets that … [Read more...] about How to Build a Strategic IT Budget and Get the C-Suite to Recognize Your Value
Data silos, while common, are huge sources of inefficiency in any department or organization. This problem is exacerbated in IT, where any loss of time can incur huge costs. This blog will discuss, from the perspective of NetOps and SecOps, what data silos … [Read more...] about What is a Data Silo and Why is It Bad for Your Organization?
One of last year’s biggest threats is rearing its ugly head again in the form of a WannaCry phishing email scam. Early on June 21st, many people in the UK received an email informing them that the sender had infected their system with WannaCry. The senders … [Read more...] about This WannaCry Phishing Email is an Empty Threat
The EU’s General Data Protection Regulation (GDPR) goes into effect starting today. Even if you don’t follow news related to data privacy, you’ve probably noticed that something’s going on. All month, organizations have been sending notifications of privacy … [Read more...] about Watch Out for GDPR Phishing Scams
Cybersecurity is never easy, but maintaining a secure small business network is arguably even harder because the IT team has much fewer staff. Even high-stakes networks, such as in hospitals or schools, are often managed by a single person. In situations like … [Read more...] about How to Maintain a Secure Small Business Network (Even When You Work Alone)
To detect a phishing scam, we typically examine hyperlinks for odd domains or subtle character changes (like a “1” in place of an “I”). But suppose a bad link looked completely normal, or perfectly mimicked one you often visit? The traditional detection … [Read more...] about Unicode Domain Phishing Attacks: Can You Spot the Difference?