What is a Port Scan and Why Should it Concern Me?

If you are paying attention to the news at all right now, you have noticed the increase in cyber-attacks around the globe. Cyber-crimes are a hot topic and for a good reason. The threat is terrifying but understanding what is indeed happening is a challenge. Within cyber-crime reporting, keywords are being thrown around, and to understand the dangers, you must first understand a few of the basics. One of the topics you may have heard is port scans. First off, what is a port and why is a port scan a threat?

Read more

Small Business Technology ABC’s

The must-have technologies for a successful small business

For anyone who has ever started a business, you know just how challenging the process can be. Many times, the concept of owning your own business is hugely glamorized. Many dream of having a beautiful office, making your own hours and instantly finding great success with the launch of your idea or product. What people do not think about is the day-to-day grind that can quickly flip a small business to no-business. Which is why over 50% of small businesses do not make it more than 5 years. Below are three technology musts to help make the day-to-day world of small business as efficient as possible.

Read more

Artificial Intelligence, Not Just for the Big Dogs

What is Artificial Intelligence and how can the small business owner benefit from it?

Artificial Intelligence or AI is the “it” technology. Everyone is talking about AI but without fully understanding what it is many think it is unattainable for their business. We see companies like IBM, Facebook and Google using it and believe that it is extremely out of reach for the average sized company. Let’s take a look at AI and debunk that notion and dig into how this incredible technology can benefit companies of any size and specifically, small businesses.

Read more

Keylogging Uncovered.

Keylogging. Is it a new concept or just an updated version of Espionage?

Information and specifically confidential data have always had a price, and someone has always wanted to get a hold of it. Documented spies date back in history from the 1st century. Espionage continues to evolve, and we as users of technology must stay on top of how our data is being hacked. Keylogging is one of today’s modern cyber-crimes but has the same basis as ancient spies.

Read more

What's Mike digesting? The antithesis to: What's Eating Gilbert Grape

 

June's Edition of:

A monthly look at what Pendello President, Mike Jackson is reading or listening to:

 

 

Who By, Geoff Smart and Randy Street

 

What is the hardest part of running and growing a business? As an initial reaction, many people believe the most challenging part of running a business is sales, but in reality, the number one issue that companies run in to is hiring! Did you know that the average hiring mistake can cost a company $1.5 million or more a year? 

Read more

Today’s Tricksters Aren’t Using Whoopie Cushions They’re Stealing Millions!

FBI announces arrests of 74 involved in a massive phishing scam

Gone are the days when getting tricked merely involved a whoopie cushion or maybe an exploding cigarette. Today the tricks are severe and can include thousands of dollars! Last week, the FBI announced that after a six-month investigation, they had made 74 arrests across seven different countries (including the US) and broke up a significant phishing ring! This Nigerian originating ring targeted mid-sized businesses and tricked these unsuspecting victims into believing they were sending money to business partners! The same type of email phishing scams that stole money from Google and Facebook!

Read more

Crouching Rat, Hidden Cobra

The North Korean Edition of Crouching Tiger, Hidden Dragon

Security is at the forefront of everyone's mind these days and for an excellent reason. Attacks are genuinely coming from every angle. In fact, the FBI has just released a warning about an infamous operation in which the US government has given the code name, Hidden Cobra. These North Korean government-linked hackers have been using two strains of malware to remotely penetrate global systems with the intent to steal passwords and other sensitive data. The tools they are using to gain access are, the remote access tool (RAT) Joanap RAT and the Server Message Block (SMB) worm Brambul and have potentially been using these tools with the same intent since 2009. Remember the 2014 attack on Sony Pictures Entertainment and the WannaCry malware attack….this was the same group.

Read more

Recent Posts

20 Critical Questions You Must Ask Before Hiring any IT Company