If you are paying attention to the news at all right now, you have noticed the increase in cyber-attacks around the globe. Cyber-crimes are a hot topic and for a good reason. The threat is terrifying but understanding what is indeed happening is a challenge. Within cyber-crime reporting, keywords are being thrown around, and to understand the dangers, you must first understand a few of the basics. One of the topics you may have heard is port scans. First off, what is a port and why is a port scan a threat?
The must-have technologies for a successful small business
For anyone who has ever started a business, you know just how challenging the process can be. Many times, the concept of owning your own business is hugely glamorized. Many dream of having a beautiful office, making your own hours and instantly finding great success with the launch of your idea or product. What people do not think about is the day-to-day grind that can quickly flip a small business to no-business. Which is why over 50% of small businesses do not make it more than 5 years. Below are three technology musts to help make the day-to-day world of small business as efficient as possible.
What is Artificial Intelligence and how can the small business owner benefit from it?
Artificial Intelligence or AI is the “it” technology. Everyone is talking about AI but without fully understanding what it is many think it is unattainable for their business. We see companies like IBM, Facebook and Google using it and believe that it is extremely out of reach for the average sized company. Let’s take a look at AI and debunk that notion and dig into how this incredible technology can benefit companies of any size and specifically, small businesses.
Keylogging. Is it a new concept or just an updated version of Espionage?
Information and specifically confidential data have always had a price, and someone has always wanted to get a hold of it. Documented spies date back in history from the 1st century. Espionage continues to evolve, and we as users of technology must stay on top of how our data is being hacked. Keylogging is one of today’s modern cyber-crimes but has the same basis as ancient spies.
June's Edition of:
A monthly look at what Pendello President, Mike Jackson is reading or listening to:
Who By, Geoff Smart and Randy Street
What is the hardest part of running and growing a business? As an initial reaction, many people believe the most challenging part of running a business is sales, but in reality, the number one issue that companies run in to is hiring! Did you know that the average hiring mistake can cost a company $1.5 million or more a year?
FBI announces arrests of 74 involved in a massive phishing scam
Gone are the days when getting tricked merely involved a whoopie cushion or maybe an exploding cigarette. Today the tricks are severe and can include thousands of dollars! Last week, the FBI announced that after a six-month investigation, they had made 74 arrests across seven different countries (including the US) and broke up a significant phishing ring! This Nigerian originating ring targeted mid-sized businesses and tricked these unsuspecting victims into believing they were sending money to business partners! The same type of email phishing scams that stole money from Google and Facebook!
The North Korean Edition of Crouching Tiger, Hidden Dragon
Security is at the forefront of everyone's mind these days and for an excellent reason. Attacks are genuinely coming from every angle. In fact, the FBI has just released a warning about an infamous operation in which the US government has given the code name, Hidden Cobra. These North Korean government-linked hackers have been using two strains of malware to remotely penetrate global systems with the intent to steal passwords and other sensitive data. The tools they are using to gain access are, the remote access tool (RAT) Joanap RAT and the Server Message Block (SMB) worm Brambul and have potentially been using these tools with the same intent since 2009. Remember the 2014 attack on Sony Pictures Entertainment and the WannaCry malware attack….this was the same group.