What is Ransomware? In very simple terms it is an email that looks official but if you click on the attachment you are loading a program that can lock important files. To get the files back a ransom is demanded. By the way do not pay until you have spoken to us or someone with […]
IT Compliance Challenges
Compliance is a hot issue in IT, and for good reason. Failure to meet the rules and guidelines of the compliance police could mean fines, steep penalties and most important is a loss of trust with your clients/customers. PCI Compliance – Protect your card Compliance is needed in many areas of business large and small. […]
Cyber Security and Machine Learning
Machine learning has come of age in the Cyber Security world. A new company named Darktrace is now using this method to fight cybercrime. The analogy of the human immune system is used. Just like your body’s defense system notifies you when something is wrong, Darktrace can notify your network when a problem is brewing. […]
Security and Pen Testing
Pen Testing | Utah Security Issues Pen testing is an effective way to discover vulnerabilities in your system. If you are not aware of your vulnerabilities then this is a good first step. Pen or Penetration Testing Trends Pen testing involves several steps to be effective: 1. Invite a hacker to gain access to your […]