William Burgess

About William Burgess

This author has not yet filled in any details.
So far William Burgess has created 11 blog entries.

Backup Strategy


A backup strategy is the most critical part of IT operations that is consistently overlooked or ignored. Your IT consultant or internal department should take the time to build a backup strategy focused around customer business needs, whether that is local, cloud or hybrid. Types of Backups for a Backup Strategy Block Level (Ex: [...]

Backup Strategy2017-04-18T15:18:03+00:00



In 2008, a surprising practical application of electronic currency came into use. This week, we look at what is now known as the Bitcoin; how it works and what it might mean to online economic development. The Internet has grown, and commercialization has brought in worldwide participation. An open exchange of ideas and business models [...]




Back in January of 2016, the food chain Wendy's made the news for a Point of Sale (PoS) data breach. As the details have slowly emerged, it has revealed several good and bad points about the way American retailer payments systems are changing. Not surprising to many, the US has the oldest and most [...]

EMV Lag2017-05-10T14:11:37+00:00

What is the Deep Web?


This post we look deeper into the poorly understood world called the Deep Web. We'll take a look at how large this hidden realm might be and the types of activities that take place far below the surface world of Google and Facebook. Oddly enough, we seem to be surrounded by references to the [...]

What is the Deep Web?2017-04-18T15:24:00+00:00

What is Vishing?


In a previous post, we covered Phishing and Spear Phishing. Another trend to be watchful for is a variation of these over mobile platforms. The concepts of "Smishing" and "Vishing" are targeted at mobile electronic devices and work in the same manner as phishing tactics. Smishing is an attempt to trick a victim into [...]

What is Vishing?2017-04-18T15:24:38+00:00

A Look at Phishing: Part 2 Spear Phishing


In part 2 of our look at Phishing, we focus on a targeted form that often effects senior leadership in an organization: Spear Phishing. Spear phishing is the targeted effort to trick a small group of employees into letting hackers gain access. Spear phishing efforts often involve one of the familiar tactics of tricking [...]

A Look at Phishing: Part 2 Spear Phishing2017-04-18T15:26:09+00:00

A Look at Phishing: Part 1


The term "phishing" can be traced back to the 1970's, when a group of hackers known as "phreaks" would experiment with ways to get in and out of network systems. The earliest phreakers began with telephone systems and mimicked tones to get unauthorized calls to connect. Once they could trick the system into letting [...]

A Look at Phishing: Part 12017-04-18T15:26:18+00:00

Energy industry software and security


In the wake of the terrorist attacks in France on 13 November, 2015, much attention has been given to how terrorist networks communicate securely over Internet connections. This online activity has led many to look deeper at online behavior. Likewise, illegal activity has led many to look deeper vulnerable networks of industrial systems. In [...]

Energy industry software and security2017-04-18T15:26:35+00:00

Understanding Botnets


This post, we take a look at Botnets: what they are, how they work, and how they are shaping the foundations for future software security efforts. A botnet is a collaboration of many computers working together to accomplish a task. On the face, this seems harmless enough. When one considers that most botnets are [...]

Understanding Botnets2017-04-18T15:26:43+00:00