The Equifax Breach and What the Future of Social Security Identification May Look Like

By now, you may have heard mention of the Equifax breach, where 146 million Americans – virtually half of our country’s population – had their social security numbers exposed. The hacking occurred between mid-May and July, and the information that was viewed also included 11 million driver’s licenses, and in some cases, credit card information. You’re probably saying to yourself “How did an extremely trusted...

October 31, 2017 by James Edwards 0 Comments
Read More

Bluetooth and the IoT – What You Need to Know About Hacking

Just a few days ago, the United States Computer Emergency Readiness Team (US-CERT) issued a statement concerning the risks that Bluetooth devices could be compromised. The Bluetooth implementation vulnerabilities are known as  BlueBorne. In laymen’s terms, it means that millions of Bluetooth-enabled devices are vulnerable to multiple types of compromises.   The vulnerable systems on those devices include...

September 22, 2017 by James Edwards 0 Comments Tags: blueborn, bluetooth, iot
Read More

Artificial Intelligence Equals Stronger Defense

What makes us smarter? Is it knowledge? Preparedness? How about a stronger sense of what’s ahead? With IT security, we’re always trying to outsmart the next generation of potential threats. Be it robotic or man-made, it’s the ability to stay ahead of threats that makes us smarter. What’s ahead for the next generation of security? It’s the incorporation of machine learning, otherwise known as Artificial...

July 19, 2017 by James Edwards 0 Comments
Read More

Two-Factor Authentication

Many people don’t know about Two-Factor Authentication (or two-step authentication), but are using it daily. Two-factor authentication means that you have two sets of identification that verify a user’s identity. Basically, the information requested is for two things that only the user should know, and this information authenticates that the user IS the person they claim to be. For example, several leading...

Read More

Password Management 101

I know you’re excited when you hear the words “Create a New Password”, right? In IT, we hear a LOT about the struggle to track different sites and applications that need a username and password. So what are the best practices to ensure that when created, the username and password are both effective and memorable? First, these are the basic points that we recommend when creating your password: Do not reuse or...

May 23, 2017 by James Edwards 0 Comments Tags: IT Security, Password
Read More

I Have Computer Security Software, So Why Should I Worry About Public Wi-Fi?

There’s a common misunderstanding about how Wi-Fi relates to your computer’s security. Wi-Fi is basically the access road to the internet. Once data is released into Wi-Fi, the security of your computer can no longer protect that data. There are secured Wi-Fi channels, which means that you must enter a password to connect, and then there are public Wi-Fi channels which are open to anyone to use. I’m explaining...

May 16, 2017 by James Edwards 0 Comments Tags: IT Security, wifi
Read More

Should I Delete This?

If you receive a questionable email, what do you do with it? What if it’s from a good friend, or someone you haven’t spoken with in a while? What if it’s from someone who may legitimately want to do business with you? Common sense – or gut feelings – are probably the biggest ally you have to decide what to do next. What made you second-guess the email’s authenticity? Is it something you could Google online to...

May 09, 2017 by James Edwards 0 Comments Tags: email, spam, viruses
Read More