What’s the easiest way steal something that is kept securely behind a lock? Get ahold of the key. Or even better, just have someone let you in. Sounds preposterous but this is the number one way tech criminals get access to personal identities and private company information; the users are tricked into handing it over. Social Engineering is the science
Read more →Blog
What is the GDPR? The General Data Protection Regulation is a framework of legal guidelines for collection and processing of personal info of individuals within the European Union. Or, in short, it’s a set of rules that companies need to follow to collect and protect a user’s data. As of May 25th, 2018, any company, group, or individual, that handles
Read more →No one likes being told what to do, especially when you are being told you are doing something wrong. This is why the topic of balanced technology management is not a popular one. We all love our phones, computers, and TVs but we’ve become so reliant on these things for simplifying our lives and entertaining us that we are running
Read more →Many people have heard about Bitcoin and cryptocurrency but, like many new technologies, most wave it off as being too complicated to understand. Not so. Given how much I enjoy demystifying tech for others, I’ve broken it down in a way that even a grade 5 student can understand it. And for reference, I did run this by an actual
Read more →When I started my career as a software developer, the word cybersecurity was thrown around as a technical term describing how computer data was encrypted and protected within an electrical system. Fast forward a few decades and now cybersecurity affects everyone who touches a digital device. The problem is many people still feel like it’s a technical issue that they
Read more →As the internet expands, so do the ways criminals find to abuse it. The best way to protect yourself and your business is to be diligent about how, where, and when you share information. Cybersecurity has become a huge issue. No matter how good your technological defences are, it is usually a person, not a machine, that gives up access
Read more →