William Burgess

About William Burgess

This author has not yet filled in any details.
So far William Burgess has created 11 blog entries.

Backup Strategy

2017-04-18T15:18:03+00:00

A backup strategy is the most critical part of IT operations that is consistently overlooked or ignored. Your IT consultant or internal department should take the time to build a backup strategy focused around customer business needs, whether that is local, cloud or hybrid. Types of Backups for a Backup Strategy Block Level (Ex: [...]

Bitcoin

2017-05-08T12:18:03+00:00

In 2008, a surprising practical application of electronic currency came into use. This week, we look at what is now known as the Bitcoin; how it works and what it might mean to online economic development. The Internet has grown, and commercialization has brought in worldwide participation. An open exchange of ideas and business models [...]

EMV Lag

2017-05-10T14:11:37+00:00

Back in January of 2016, the food chain Wendy's made the news for a Point of Sale (PoS) data breach. As the details have slowly emerged, it has revealed several good and bad points about the way American retailer payments systems are changing. Not surprising to many, the US has the oldest and most [...]

What is the Deep Web?

2017-04-18T15:24:00+00:00

This post we look deeper into the poorly understood world called the Deep Web. We'll take a look at how large this hidden realm might be and the types of activities that take place far below the surface world of Google and Facebook. Oddly enough, we seem to be surrounded by references to the [...]

What is Vishing?

2017-04-18T15:24:38+00:00

In a previous post, we covered Phishing and Spear Phishing. Another trend to be watchful for is a variation of these over mobile platforms. The concepts of "Smishing" and "Vishing" are targeted at mobile electronic devices and work in the same manner as phishing tactics. Smishing is an attempt to trick a victim into [...]

A Look at Phishing: Part 1

2017-04-18T15:26:18+00:00

The term "phishing" can be traced back to the 1970's, when a group of hackers known as "phreaks" would experiment with ways to get in and out of network systems. The earliest phreakers began with telephone systems and mimicked tones to get unauthorized calls to connect. Once they could trick the system into letting [...]

Understanding Botnets

2017-04-18T15:26:43+00:00

This post, we take a look at Botnets: what they are, how they work, and how they are shaping the foundations for future software security efforts. A botnet is a collaboration of many computers working together to accomplish a task. On the face, this seems harmless enough. When one considers that most botnets are [...]