Blog

3f7fe6_50ca5355481249e58436a36631ce6ab2mv2

U.S. Senators Banning the Use of Strong Encryption

Last week, Republican U.S. Senators introduced the Lawful Access to Encrypted Data Act “ending the use of ‘warrant-proof’ encrypted technology by terrorists and other bad actors to conceal illicit behavior.” Experts and privacy advocates think it can effectively outlaw strong encryption. As the name may suggest, the Lawful Access to Encrypted Data Act (LAED Act,…

3f7fe6_a8fd76b55e65405e806cea0f4d807343mv2

Lawsuit Claims Google Private Browsing Isn’t Really Private

Google is in hot water with a complaint filed to the District Court of Northern California. The complaint alleges that the tech giant tracks users’ browsing data and a variety of other identifying information via Google Ad Manager, Google Analytics, and a variety of other applications. It tracks data even when users are accessing the…

3f7fe6_062b46fc9ed148d5aef148d5c602c9b0mv2

Intel Steps Up Game With CPU-Level Malware Protection

Tech companies both big and small are always looking for new ways to protect their customers from the threat of malware. While that’s not something that hardware vendors are known for, Intel has leapt into the fray with a recent announcement. Their planned “Tiger Lake” mobile processers will offer CPU-level malware protection features. Tom Garrison…

3f7fe6_bafd62be5c8b4745af6f08942578b91bmv2

Cybercriminals Are Counting On You!

The world is slowing down during this COVID-19 pandemic. Wall Street is being hit hard. People are no longer going out. We’re told to quarantine or self-isolate and not engage in groups. You can bet there’s one group that’s not slowing down at all. In fact, they’re probably working overtime while the rest of us…

How To Quickly Shift To A WFH Business

As a business owner today, you are now facing unprecedented challenges to help deal with the coronavirus pandemic. You are asked to self-isolate and practice social distancing to “flatten the curve.” You are asked to allow your employees to work from home to reduce possible exposure and slow the spread of COVID-19. These are all…

Secure Remote Access for Your Workforce at Scale

Organizations face a number of different potential emergency situations, such as illness, flood, hurricanes, and power outages. Implementing a business continuity plan is essential to ensuring that the organization is capable of maintaining operations in the face of adversity and preparing for potential disasters. An important consideration for organizations developing a business continuity plan is…

3f7fe6_f83a38278dbd4079a5d6348c19554f61mv2

Backup is King

Everyone should backup their data, especially for a business. Unforeseen events happen and no matter how much you pray, wish or deny, failures happen. I believe in the 3-2-1-0 Rule, regardless of Operating System, Manufacture or Support Contract. This approach helps to answer two important questions: how many backup files should I have and where…

Our privacy is once again being trampled on.

The US Senate recently passed a bill to extend elements of the Patriot Act. Notably, this legislation included parts that would increase the FBI and CIA’s ability to legally access your browser search history without a warrant. The age-old argument that’s often trotted out when government power is expanded to trespass on individual privacy is…

Review of the Surface Book 3

I used to work with Scott Hanselman, way back in the day. He now works at Microsoft as a Technology Evangelist. His blog is not only a great resource, but a wealth of knowledge for the development community. Go to his link for a deep dive into the Surface Book 3. My assessment of the…