<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Anti Virus Cloud Solutions

Posted by Cam Green on Wed, Oct 17, 2012

antivirus_cloud_solutionsToday we will discuss two antivirus services made within the last 5 years that use cloud solutions to constantly update and improve their respective products. Is this the direction that future technology is heading in? It seems as if that is what the tech news outlets believe since both of these programs were featured in the past month.

Read More

Topics: Cloud Computing, Disaster Recovery, Managed Services, Data Security

What is the deal with NFC technology and the security behind it?

Posted by Cam Green on Wed, Sep 26, 2012

nfc_technologyNFC Technology: Near-Field-Communications is a set of short-range wireless technologies, typically requiring a distance of 4cm or less. NFC operates at 13.56 MHz and at rates ranging from 106 kbit/s to 848 kbit/s.

Read More

Topics: Social Media, New Technology, Data Security

Your Password and Security Questions Can be Surpassed

Posted by Phuong Diep on Tue, Aug 07, 2012

Matt HolanAll of your life you’ve learned that in order to prevent yourself from being hacked, your password should be more than 6 characters long, with at least one number in your password. Along with that, most websites even require a security question to surpass the password when you log in on an unfamiliar computer. You would think that through this process that your account and information would be protected and that you have nothing to worry about. People have believed this for years but now their beliefs have changed thanks to Mat Honan, whose digital life was destroyed by hackers due to Apple and Amazon’s security flaws.

Read More

Topics: Disaster Recovery, Data Security

Technology, Human Rights, Social Media and Privacy

Posted by Phuong Diep on Tue, Jun 26, 2012

describe the imageSocial media and technology play a big role in our lives by keeping us entertained and well-connected with our clients, co-workers, friends and family. It has become a part of our daily lives and something we cannot go without. Technology and social media has also become increasingly important in the political arena, use of online social media for political activism is used through blogs, video and social networking sites and has become a key for political debate – so much so that it has provoked a counter-response from some repressed countries.   During 2011 blogging, video-sharing and tweeting were crucial in political events in the Middle East and North Africa. (https://wcd.coe.int/ViewDoc.jsp?id=1904319 )

Read More

Topics: Social Media, New Technology, Data Security

Stuxnet and Flame—No These are Not Pet Names

Posted by Phuong Diep on Wed, Jun 13, 2012

IT SecurityIf you thought viruses were scary, wait until you encounter Stuxnet and Flame. Well, let’s hope you don’t encounter them. What is Stuxnet and Flame you might wonder? Stuxnet is a computer worm that originated from the “Olympic Games,” a code name for a series of cyber attacks that were secretly launched on Iranian computers by President Obama. The worm was found traveling from computer to computer in different parts of the world and was powerful enough to take down between 1,000-5,000 centrifuges that Iran was using for its uranium. Stuxnet is the first cyber weapon ever used to cripple another country’s foundation.

Read More

Topics: Disaster Recovery, Managed Services, Data Security