The Equifax Breach and What the Future of Social Security Identification May Look Like

By now, you may have heard mention of the Equifax breach, where 146 million Americans – virtually half of our country’s population – had their social security numbers exposed. The hacking occurred between mid-May and July, and the information that was viewed also included 11 million driver’s licenses, and in some cases, credit card information. You’re probably saying to yourself “How did an extremely trusted...

October 31, 2017 by James Edwards 0 Comments
Read More

Tips for an Easier Install of Microsoft .NET Framework 3.5 and Up

Are you ready to install Microsoft .NET Framework 3.5 and up on Windows 10?  Use this quick hack guide to avoid headaches and problems!  What is Microsoft .NET Framework? Microsoft .NET Framework is a set of libraries that are used in Windows applications.  Microsoft releases regular updates and service packs to provide fixes and security updates to the .NET framework.   Why is it important? Without it, any .NET...

October 06, 2017 by James Edwards 0 Comments
Read More

Backup versus Disaster Recovery – Why a Good Recovery Plan Needs Both

Major disasters like hurricanes and security breaches remind us why having a great IT company is important. It’s not just for the everyday. Our purpose is to protect and secure your most valuable work. Our task is to create a recovery plan that allows you to recover and restore any damage or lost assets as quickly as possible, as well as to protect those files from those who shouldn’t have access....

September 29, 2017 by James Edwards 0 Comments Tags: backup, disaster recovery
Read More

Bluetooth and IoT – What You Need to Know About Hacking

Just a few days ago, the United States Computer Emergency Readiness Team (US-CERT) issued a statement concerning the risks that Bluetooth devices could be compromised. The Bluetooth implementation vulnerabilities are known as  BlueBorne. In laymen’s terms, it means that millions of Bluetooth-enabled devices are vulnerable to multiple types of compromises.   The vulnerable systems on those devices include...

September 22, 2017 by James Edwards 0 Comments Tags: blueborn, bluetooth, iot
Read More

When Clouds Fail

Even the big guys make mistakes from time to time. Fortunately, I’m not talking about us. I’m referencing a memo issued concerning a Cisco product called Meraki, which is used for setting up security networks backed with cloud technology. The memo addresses a system policy change that deleted some information stored to the cloud. This did not disrupt secured systems or the ability to maintain a network, but it...

August 18, 2017 by James Edwards 0 Comments
Read More

How Greenville County’s Law Enforcement Is Tackling Crime in a New Way, Thanks to IoT

(Please note: Information provided in this blog are the expressed opinions of Merit Technologies and are not necessarily reflective of the Greenville County Sheriff’s Office.)   There’s a term for the multitude of devices that connect to the Internet on our behalf: Internet of Things (IoT) goes beyond the traditional server, laptops, and cell phones. IoT includes any other devices like TV’s, refrigerators,...

August 01, 2017 by James Edwards 0 Comments
Read More

Artificial Intelligence Equals Stronger Defense

What makes us smarter? Is it knowledge? Preparedness? How about a stronger sense of what’s ahead? With IT security, we’re always trying to outsmart the next generation of potential threats. Be it robotic or man-made, it’s the ability to stay ahead of threats that makes us smarter. What’s ahead for the next generation of security? It’s the incorporation of machine learning, otherwise known as Artificial...

July 19, 2017 by James Edwards 0 Comments
Read More