Blog
U.S. Senators Banning the Use of Strong Encryption
Last week, Republican U.S. Senators introduced the Lawful Access to Encrypted Data Act “ending the use of ‘warrant-proof’ encrypted technology by terrorists and other bad actors to conceal illicit behavior.” Experts and privacy advocates think it can effectively outlaw strong encryption. As the name may suggest, the Lawful Access to Encrypted Data Act (LAED Act,…
Lawsuit Claims Google Private Browsing Isn’t Really Private
Google is in hot water with a complaint filed to the District Court of Northern California. The complaint alleges that the tech giant tracks users’ browsing data and a variety of other identifying information via Google Ad Manager, Google Analytics, and a variety of other applications. It tracks data even when users are accessing the…
Intel Steps Up Game With CPU-Level Malware Protection
Tech companies both big and small are always looking for new ways to protect their customers from the threat of malware. While that’s not something that hardware vendors are known for, Intel has leapt into the fray with a recent announcement. Their planned “Tiger Lake” mobile processers will offer CPU-level malware protection features. Tom Garrison…
Cybercriminals Are Counting On You!
The world is slowing down during this COVID-19 pandemic. Wall Street is being hit hard. People are no longer going out. We’re told to quarantine or self-isolate and not engage in groups. You can bet there’s one group that’s not slowing down at all. In fact, they’re probably working overtime while the rest of us…
How To Quickly Shift To A WFH Business
As a business owner today, you are now facing unprecedented challenges to help deal with the coronavirus pandemic. You are asked to self-isolate and practice social distancing to “flatten the curve.” You are asked to allow your employees to work from home to reduce possible exposure and slow the spread of COVID-19. These are all…
Secure Remote Access for Your Workforce at Scale
Organizations face a number of different potential emergency situations, such as illness, flood, hurricanes, and power outages. Implementing a business continuity plan is essential to ensuring that the organization is capable of maintaining operations in the face of adversity and preparing for potential disasters. An important consideration for organizations developing a business continuity plan is…
Backup is King
Everyone should backup their data, especially for a business. Unforeseen events happen and no matter how much you pray, wish or deny, failures happen. I believe in the 3-2-1-0 Rule, regardless of Operating System, Manufacture or Support Contract. This approach helps to answer two important questions: how many backup files should I have and where…
Our privacy is once again being trampled on.
The US Senate recently passed a bill to extend elements of the Patriot Act. Notably, this legislation included parts that would increase the FBI and CIA’s ability to legally access your browser search history without a warrant. The age-old argument that’s often trotted out when government power is expanded to trespass on individual privacy is…
Review of the Surface Book 3
I used to work with Scott Hanselman, way back in the day. He now works at Microsoft as a Technology Evangelist. His blog is not only a great resource, but a wealth of knowledge for the development community. Go to his link for a deep dive into the Surface Book 3. My assessment of the…