When dealing with cloud computing, one of the top questions we receive at Pendello Solutions is, “Is the cloud safe?” What most people mean by this question is, “How is the cloud a better option than having my data and applications on-premise?” As with anything in today’s business world, security needs to be verified. There are definitely perceptions of the cloud and this week our focus is to take a look at these perceptions and decide truth or myth.
Real-life examples of BECs
If you have been following the news, you should know that we are all at risk of Business Email Compromises (BEC). You may be growing tired of hearing this fact although it is a fact that we need to keep in the front of our minds at all time! Timing is a factor that these cybercriminals are continually accessing and know how to attack when your guard is down. Below are real-life examples of BECs that illustrate how easily these attackers researched, planned and struck at the right time and were able to victimize educated, experienced business people.
Business Email Compromise and Education
This month at Pendello we have been focusing on Business Email Compromise as the risk is definitely on the rise. If you remember, Business Email Compromise (BEC) is when an organized crime group gains access to your email through deception with the use of spear-phishing, identity theft, email spoofing, malware, and social engineering. In the past two weeks’ blogs, we introduced BECs and the different types of attack attempts. This week we are delving into how to recognize attack attempts. As 93% of all investigated data breaches can be traced back to a specific employee, we at Pendello Solutions know that end-user education is your best defense. So this month Pendello is bringing you some guidelines to look for when dealing with your day to day communications.
This month Pendello Solutions is going to take a closer look at the Internet of Things (IoT) designed with businesses in mind. There are a plethora of IoT devices, but most of the well-known devices and intended for personal use in the home. Here at Pendello Solutions, business technology is our business, and we thought many of you might want to learn a bit more about how IoT is shaping the business world.
Ransomware is another hot topic when it comes to Cyber-crimes. It is on the news (WannaCry, NotPetya), on the movies, and on security experts’ minds! What is ransomware and how does it infect computers. These topics are important ones if you strive to understand the safety and security of your business, data, and finances.
What is Artificial Intelligence and how can the small business owner benefit from it?
Artificial Intelligence or AI is the “it” technology. Everyone is talking about AI but without fully understanding what it is many think it is unattainable for their business. We see companies like IBM, Facebook and Google using it and believe that it is extremely out of reach for the average sized company. Let’s take a look at AI and debunk that notion and dig into how this incredible technology can benefit companies of any size and specifically, small businesses.
Watson...is it one of the robots from Mystery Science Theater or the Smartest Golden Retriever ever?
Watson is Artificial Intelligence. A computer that thinks like you and me but light-years faster and doesn't have the brain-fog from last night's carb-loaded meal. To understand the basis of this, first, take how our search process has worked in the past. Previously, we could do a keyword search that would return a list of content listed in order of relevancy. Watson is different, it is based on Question-Answering technology. Instead of traditional search capabilities relying on computer-based "coding" language, Watson understands actual human languages. According to IBM, more than 100 different techniques are used to understand and analyze natural language, identify sources, find and generate hypotheses, find and score evidence and merge and track predictions. So instead of returning a list of content, it honestly answers your questions.