This month Pendello Solutions is taking a closer look at the Internet of Things (IoT) designed with businesses in mind. There are a plethora of IoT devices, but most of the well-known devices are intended for personal use in the home. Here at Pendello Solutions, business technology is our business, and we thought many of you might want to learn a bit more about how IoT is shaping the business world.
This month Pendello Solutions is going to take a closer look at the Internet of Things (IoT) designed with businesses in mind. There are a plethora of IoT devices, but most of the well-known devices and intended for personal use in the home. Here at Pendello Solutions, business technology is our business, and we thought many of you might want to learn a bit more about how IoT is shaping the business world.
What exactly is the Internet of Things (IoT)? In the simplest of terms, it is the interconnection of devices which allows them to communicate and collect data fully. When we think of connecting devices, we typically think of our smartphones, computers, and TVs but the IoT goes way beyond this. The devices that are now being connected include such things as cars, jet engines, coffee makers, refrigerators, heart monitors and soon, potentially anything with an on/off switch could potentially be connected.. According to Gartner, it is expected that there will be 20.4 billion devices connected by 2020.
Unless you have been living off the grid for the past year, you have heard of the massive increase in cybercrimes. One of the easiest ways for a hacker to get into your computer is by guessing your password. Think your password is secure? Are you aware that it takes less than 2 seconds to crack a simple 7-character password? Or that it takes only 13-hours to crack a simple 10-character password. But it takes a seasoned hacker over 10-centuries to hack a 12-character password that includes a space. So how do you keep your data as save as possible by creating a solid password?
We now have new air, a pro, and a mini!
Last week, in Brooklyn, New York, Apple held its hardware event where they announced their Mac and iPad news. As always, Apple’s releases are exciting, and a few heavily requested updates were met! The announcements included a new and improved Mac Book Air, the return of the Mac Mini and an iPad Pro.
Ransomware is another hot topic when it comes to Cyber-crimes. It is on the news (WannaCry, NotPetya), on the movies, and on security experts’ minds! What is ransomware and how does it infect computers. These topics are important ones if you strive to understand the safety and security of your business, data, and finances.
If you are paying attention to the news at all right now, you have noticed the increase in cyber-attacks around the globe. Cyber-crimes are a hot topic and for a good reason. The threat is terrifying but understanding what is indeed happening is a challenge. Within cyber-crime reporting, keywords are being thrown around, and to understand the dangers, you must first understand a few of the basics. One of the topics you may have heard is port scans. First off, what is a port and why is a port scan a threat?