9 .Net Terms Your Developer Wants You To Know

2017-04-19T12:06:45-05:00

What exactly is .Net and what are the terms associated with it? With the demand for .Net development steadily increasing, many professionals may find themselves either hiring a .Net developer or working with one on a project. Either way, knowing some of the basic terminologies will improve communications and help move the project along. Lee [...]

9 .Net Terms Your Developer Wants You To Know2017-04-19T12:06:45-05:00

Backup Strategy

2017-04-18T15:18:03-05:00

A backup strategy is the most critical part of IT operations that is consistently overlooked or ignored. Your IT consultant or internal department should take the time to build a backup strategy focused around customer business needs, whether that is local, cloud or hybrid. Types of Backups for a Backup Strategy Block Level (Ex: [...]

Backup Strategy2017-04-18T15:18:03-05:00

Bitcoin

2017-05-08T12:18:03-05:00

In 2008, a surprising practical application of electronic currency came into use. This week, we look at what is now known as the Bitcoin; how it works and what it might mean to online economic development. The Internet has grown, and commercialization has brought in worldwide participation. An open exchange of ideas and business models [...]

Bitcoin2017-05-08T12:18:03-05:00

EMV Lag

2017-05-10T14:11:37-05:00

Back in January of 2016, the food chain Wendy's made the news for a Point of Sale (PoS) data breach. As the details have slowly emerged, it has revealed several good and bad points about the way American retailer payments systems are changing. Not surprising to many, the US has the oldest and most [...]

EMV Lag2017-05-10T14:11:37-05:00

What is the Deep Web?

2017-04-18T15:24:00-05:00

This post we look deeper into the poorly understood world called the Deep Web. We'll take a look at how large this hidden realm might be and the types of activities that take place far below the surface world of Google and Facebook. Oddly enough, we seem to be surrounded by references to the [...]

What is the Deep Web?2017-04-18T15:24:00-05:00

What is Vishing?

2017-04-18T15:24:38-05:00

In a previous post, we covered Phishing and Spear Phishing. Another trend to be watchful for is a variation of these over mobile platforms. The concepts of "Smishing" and "Vishing" are targeted at mobile electronic devices and work in the same manner as phishing tactics. Smishing is an attempt to trick a victim into [...]

What is Vishing?2017-04-18T15:24:38-05:00

A Look at Phishing: Part 2 Spear Phishing

2017-04-18T15:26:09-05:00

In part 2 of our look at Phishing, we focus on a targeted form that often effects senior leadership in an organization: Spear Phishing. Spear phishing is the targeted effort to trick a small group of employees into letting hackers gain access. Spear phishing efforts often involve one of the familiar tactics of tricking [...]

A Look at Phishing: Part 2 Spear Phishing2017-04-18T15:26:09-05:00

A Look at Phishing: Part 1

2017-04-18T15:26:18-05:00

The term "phishing" can be traced back to the 1970's, when a group of hackers known as "phreaks" would experiment with ways to get in and out of network systems. The earliest phreakers began with telephone systems and mimicked tones to get unauthorized calls to connect. Once they could trick the system into letting [...]

A Look at Phishing: Part 12017-04-18T15:26:18-05:00
Go to Top