Six Similarities Between GDPR & US Regulatory Requirements

As companies collect and store more and more personal information, they face data privacy risks on many fronts. Increasingly, they are being held accountable for protecting their customers’ digital privacy. New regulations, led by Europe’s General Data Protection Regulation (GDPR) in 2018, are quickly becoming normative in countries around the world. In total, 58% of all countries Read more about Six Similarities Between GDPR & US Regulatory Requirements[…]

You’ve Been Breached: Now What?

It can happen to anyone – you’ve taken steps to limit your exposure to a cyber incident. You’ve purchased and implemented top-of-the-line IT solutions. You’ve carefully thought about security best practices and strived to adhere to them. But somehow, you’ve just become the latest victim of a data breach. It might have been discretely packaged Read more about You’ve Been Breached: Now What?[…]

How to Spot a Phishing Attempt

Phishing is one of the most common, yet dangerous methods of cybercrime. It utilizes deceptive messages to trick victims into clicking untrustworthy links, downloading malicious attachments, or divulging sensitive information. Despite cybersecurity experts’ warnings over the years, it seems that internet users still consistently fall prey to these simple but effective attacks. According to Verizon’s 2019 Read more about How to Spot a Phishing Attempt[…]

HIPAA 101

Maintaining compliance in today’s ever-changing environment is no easy task, particularly within the healthcare space. In the past, hackers opportunistically targeted providers due to poor security networks and infrastructure. Over time, however, cybercriminals have realized the true value of personally identifiable information (PII) and protected health information (PHI), which can be leveraged for identity theft, financial Read more about HIPAA 101[…]

The NY SHIELD Act is Almost Here: How to Stay Compliant

Data privacy regulations are quickly becoming par for the course in countries around the world, each one bringing new, nuanced responsibilities for companies to follow. While Europe’s expansive General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA) have made most of the headlines, we are just months away from the latest privacy regulation, New Read more about The NY SHIELD Act is Almost Here: How to Stay Compliant[…]

Lunch and Learn on 3/9/18: Bitcoin, Blockchain, and Mining

  Bitcoin, a type of cryptocurrency, has been the craze for the last couple months for its exponential growth and immense potential for profitability. For reference of how lucrative Bitcoin has been, back in July of 2010, a single coin was worth $.08; in December of 2017, it reached $20,000 for a single coin. It Read more about Lunch and Learn on 3/9/18: Bitcoin, Blockchain, and Mining[…]

Top 5 Simple Tips: on Preventing Viruses, Malwares, and Security Breaches

In the previous blog post, we talked about our first speaking gig of 2018, on Cybersecurity. We talked about the importance of being very aware of the dangers of Viruses, Malwares, and Security Breaches. Here is the link to this post. With that said, 95% of breaches are caused by human error and 55% of Read more about Top 5 Simple Tips: on Preventing Viruses, Malwares, and Security Breaches[…]

First Speaking Gig of the Year – A Talk on Cybersecurity

As we get closer to 2020, we start entering the deep waters of immersive technology that can be very exciting but also worrisome. It is nice to have online banking, buy clothes from an online website, store our private photos on the cloud (instead of a physical drive that could be destroyed in a fire), and Read more about First Speaking Gig of the Year – A Talk on Cybersecurity[…]

Raspberry Pi Timer

At one of our manufacturing customers, something strange was happening. Employee lunch was at 11:45am. That became 11:40am over several months. And it was only moving earlier. After tracing out the relay wiring for the alert system, we found the connector to the relay controlling the alert system inside one of the old timeclocks. When Read more about Raspberry Pi Timer[…]

Apple iPhone 7 Smart Battery Case Is The Best!

My days are hectic. My life is run by my calendar and therefore my iPhone. I am constantly checking emails, making calls and researching topics and products from my phone all day. If you know me then you know how much I love my iPhone 7. The problem has always been the battery life! I Read more about Apple iPhone 7 Smart Battery Case Is The Best![…]

iSwitched back to the iPhone

When your phone dies at 36 percent battery remaining, you replace the battery. When the second battery does the same thing, and re-calibrating the battery doesn’t work, you get a new phone. Or at least that’s what I did. I loved my Samsung Galaxy Note 4 from the time I got it until the time Read more about iSwitched back to the iPhone[…]

What is Apple announcing tomorrow?

I get really excited at the beginning of September – every year. I am a huge Apple fan, iPhone fan, more specifically. Apple will announce the new iPhone model and we will be watching the live event tomorrow and will post what we learn afterwards. Here is what the rumors say: The design of the Read more about What is Apple announcing tomorrow?[…]

Know your terminology

We constantly come across a fair number of security related articles talking about security flaws, worms, viruses, Trojans and all manner of nasty sounding programs. With a large selection of malicious software out there, it can be tough to tell the difference between a virus and worm. Here’s an overview of the most commonly used terms Read more about Know your terminology[…]

Use Business Process Automation to increase profits!

Business process automation (BPA) is a way to manage information, processes, and data with technology in order to reduce costs for a business. Because of its success in many enterprises, BPA is a growing market. There are many ways to make money or reduce spending using BPA, including through the following five business process automation Read more about Use Business Process Automation to increase profits![…]

Crypto!

CryptoWall Viruses CryptoWall viruses such as CryptoLocker, AlphaCrypt and TeslaCrypt to name a few are ransomware trojans that encrypt any file that it has access to your on machine, delete the original, and then demand money to restore your data. What this means is that not only will it delete your files from your computer Read more about Crypto![…]

Get off your phone!

Has technology become so important that we stopped paying attention to our surroundings, friends and loved ones? What happened to getting together with group of friends and just talking about random stuff rather than taking selfies, snapchatting, instagramming or updating status on Facebook? Why are we so concerned of what other people think? Why are Read more about Get off your phone![…]

Self-driving cars!

Google has launched their new cute little autonomous vehicle (self-driving car)! Isn’t that neat? A few of the company’s prototype vehicles are now roaming the streets of downtown Austin, Texas – with a google-employed passenger, of course! This project has been around for more than five years, and the company’s cars have driven more than Read more about Self-driving cars![…]

Fastest SSDs available – for consumer use

Samsung’s latest hard drive – the 950 Pro SSD – is the fastest consumer SSD it’s ever made. The 950 Pro can reach speeds of up to 2,500Mbps and write speeds as fast as 1,500MBps. That’s ridiculously good. The 950 Pro is more than four times the read speed of the 850 Pro. The write Read more about Fastest SSDs available – for consumer use[…]

Autonomous Vessels

Earlier this month, the El Faro cargo ship went missing around the Bahamas. Approaching the Bahamas, El Faro came in contact with 125-mph winds and 50-foot seas of Hurricane Joaquin. The US Coast guard predicts the ship sank after taking on water and shortly after this the engines failed. Last Wednesday marked six days without Read more about Autonomous Vessels[…]