Education is The Strongest Line of Defense

Business Email Compromise and Education

This month at Pendello we have been focusing on Business Email Compromise as the risk is definitely on the rise. If you remember, Business Email Compromise (BEC) is when an organized crime group gains access to your email through deception with the use of spear-phishing, identity theft, email spoofing, malware, and social engineering. In the past two weeks’ blogs, we introduced BECs and the different types of attack attempts. This week we are delving into how to recognize attack attempts. As 93% of all investigated data breaches can be traced back to a specific employee, we at Pendello Solutions know that end-user education is your best defense. So this month Pendello is bringing you some guidelines to look for when dealing with your day to day communications.

Read more

Ransomware: What is it and Why is it Costing Businesses Big Money?

Ransomware is another hot topic when it comes to Cyber-crimes. It is on the news (WannaCry, NotPetya), on the movies, and on security experts’ minds! What is ransomware and how does it infect computers. These topics are important ones if you strive to understand the safety and security of your business, data, and finances.

Read more

IBM's Watson, Why is it a Game Changer in Today's Business Industry?

Watson...is it one of the robots from Mystery Science Theater or the Smartest Golden Retriever ever?

Watson is Artificial Intelligence. A computer that thinks like you and me but light-years faster and doesn't have the brain-fog from last night's carb-loaded meal. To understand the basis of this, first, take how our search process has worked in the past. Previously, we could do a keyword search that would return a list of content listed in order of relevancy. Watson is different, it is based on Question-Answering technology. Instead of traditional search capabilities relying on computer-based "coding" language, Watson understands actual human languages. According to IBM, more than 100 different techniques are used to understand and analyze natural language, identify sources, find and generate hypotheses, find and score evidence and merge and track predictions. So instead of returning a list of content, it honestly answers your questions.

Read more
1

Recent Posts

20 Critical Questions You Must Ask Before Hiring any IT Company