It’s easier than you think for organizations and their leaders to overlook cybersecurity. Unfortunately, the nature of the threat means some of the biggest worries for your organization might actually be out in plain sight. Here are five cybersecurity risks that are regularly overlooked. Inconsistent or Nonspecific Cybersecurity Training. In many cases, people are the […]
Author Archive for: ABaker
You are here: Home / ABaker
This author has yet to write their bio.Meanwhile lets just say that we are proud ABaker contributed a whooping 65 entries.
Entries by ABaker
Connected devices are essential to our professional and personal lives, and criminals have gravitated to these platforms as well. Many common crimes—like theft, fraud, harassment, and abuse—are now carried out online, using new technologies and tactics. Others, like cyber intrusions and attacks on critical infrastructure, have emerged as our dependence on connected systems revealed new vulnerabilities.
Thousands of Americans died in a terrorist attack on our nation and today is a day to honor their lives. It’s a day to honor all first responders who came together in a courageous effort to save lives. Our nation fell silent as we watched the horrific events that unfolded that day. Pain, sorrow and […]
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and an untrusted external network, such as the Internet. Firewalls block unauthorized access to your computer network from hackers, malware and viruses. They […]
A family can benefit from sharing a computer – whether it be the kids, parents or even grandparents. When you set up this new computer there are a few things to keep in mind so that everyone can enjoy it, especially if you have a large family. You will want to make sure that the […]
Many IT departments have processes to keep costs under control and systems running smoothly. However, most organizations fail to adequately plan and properly manage the end-of-life (EOL) transition for routers, firewalls, switches and other critical network infrastructure. A device that is fully depreciated does not yield cost savings – these devices actually represent potentially higher […]
When software reaches end of life (EOL), all of a sudden you find yourself wondering what impact will this have on our organization? Take a moment to understand what vulnerabilities may be at hand and what are some best practices for planning ahead. Never just ignore EOL timelines because there are some risks to be […]
Summer is here. Everyone is eager to plan those well-deserved long weekend trips and vacations. Here are some trendy, cutting edge and fun gadgets that may come in handy as you head out on your next adventure. Interested in taking high quality photos and videos on the go? If you’re taking that dream vacation and […]
The world runs on numbers and mathematics. Without mathematics, we would not have buildings or cars or airplanes or the TV or even the device you are reading this on. Indeed, math is the basis of almost all science and technology. This unofficial holiday is thought to have been created in 2009 and is a […]
If you purchased or received a new smartphone recently, you may be wondering what to do with your previous phone. Only about 10% of our mobile devices are properly recycled. Where do they go? Many remain hidden in a desk drawer or some other forgotten place. More often, they find their way into the trash […]