5 Tips to Avoiding a Data Breach


Small business owners always have a lot on their minds. They are consumed by thoughts about delivering great customer service and keeping products and services on the cutting edge to keep up with competitors.   With all of this on a business owners mind, something that often gets overlooked is security.  Security may be thought […]

Read More…


Time to Face the Online Learning Music


Face the Music The phrase, “time to face the music” started appearing in American literature and verbiage in the mid-19th century. The origin of this phrase is unclear, but there are two good possibilities. The first likely origin came from the tradition of a disgraced military officer being drummed out of their regiment. The second […]

Read More…


An Introduction to the Public Key Infrastructure


Part three of our Cryptography Series Just using Private Keys is no longer the norm in cryptography today – using a combination of both Public and Private Keys is, and it’s known as “Asymmetric Cryptography.” A type of Asymmetric Cryptography that is deployed widely today is known as the “Public Key Infrastructure,” or PKI for […]

Read More…


An Introduction to Public and Private Keys


Part two of our Cryptography Series As discussed in a previous blog post, cryptography is the science of scrambling and unscrambling a message while it is in transit.  The primary purpose of this is to keep the message content safe, in case it is intercepted by a malicious third party.   It is important to […]

Read More…


Are College Students Prepared?


For many, a college education is a goal never to be realized. For others, the college education is achieved, but their potential isn’t fully unlocked. When someone graduates from college, are they really prepared for the workforce?   A recent study from McGraw Hill states that 71 percent of college students anticipate having a job […]

Read More…


An Introduction to Cryptography


Part One of our Cryptography Series   Cryptography dates all the way back to the times of Julius Caesar.  In the simplest terms, the science of cryptography is the scrambling and unscrambling of written messages between two individual parties.   These individual parties can be referred to as the sender and the receiver.  The former […]

Read More…


5 Tips to Avoiding Ransomware


A recent blog post reviewed what Ransomware is, how it is deployed, and the types of attacks that can occur.  Essentially, it is a type of cyber-attack that can lock up your computer screen, your mission critical files, and the data that your company depends on daily.   The only way you can ever hope […]

Read More…


Minding the IT Skills Gap


The curvature at the edge of a London Underground platform, and the shape of the underground trains, leave a significant gap that could prove dangerous for passengers. For years, drivers and station attendants had the job of making sure passengers watched out for that space, or gap.   In 1968, London Underground saw the need […]

Read More…


Breaking Down What Incident Response Means for Your Business


The Need for An Incident Response Plan   In today’s world, Cyber-attacks are becoming the norm – no business or corporation is immune to them.  It seems that no matter what an entity does to fortify its defense perimeters, the hacker will find a way to circumvent it and inflict as much damage as possible.  […]

Read More…


Ransomware, what is it?


In today’s world, Cyber-attacks are becoming much more covert and sophisticated in nature.  Gone are the days when an attacker was content with simply deploying a Trojan Horse virus to secretly see what is going on in your computer.  They are now bent on a destruction of the end user’s machine, and even launching Botnet […]

Read More…