With all the recent news involving ransomware, Bitcoin has been getting more attention than ever before. It’s to the point where it’s become almost synonymous with cybercrime, but few people really understand why or even what Bitcoin is.
From June 19th to 23rd, Advantage Technology’s Cody Clay and Hunter Prather taught game design at BridgeValley CTC’s STEAM Academy in South Charleston. STEAM Academy is a week-long day camp for children going into the 5th through 10th grades hosted at the Advanced Technology Center at BridgeValley CTC. STEAM focuses on science and math education with the addition of the arts to help round out the student’s educational palette.
Advantage Technology was pleased to have almost all of our incredible women attend the Charleston Area Alliance Elevations Professional Women’s Luncheon on June 26th at Embassy Suites, as part of the greater Women & Technology conference hosted by TechConnectWV. As the room was filling, I reflected upon the solid representation of women at our company and the contrast with industry standards. We all have a unique history and serve vastly different, but crucial roles at Advantage Technology.
Two Advantage Technology professionals recently returned from the preeminent event for training, education and workforce development for protecting the country’s infrastructure from cyber threats.
The National Cyber Summit took place in early June in Huntsville, Ala. The annual event attracts commercial and defense companies as well as healthcare, automotive and energy industries and academia. It was sponsored by Information Systems Security Association.
Randy Ross and Rob Dixon from Advantage Technology were on hand to learn and to network with other providers.
In order for a business to operate at the highest and most effective level, companies must repeatedly reexamine their sense of purpose and make sure the organization serves it well. Possessing such a strong sense of purpose needs constant support from its employees, and those employees need tools to serve that purpose. Providing the right technology tools for employees and management is one of the most important aspects of a successful business.
How often does it happen that you’re working on something and have an error come up or something on the screen just looks? You call tech support and spend 20 minutes trying to describe what the screen looks like and then, after your blood pressure goes back down, the technician still has to come over to take a look or establish a remote session.
In our last blog, we discussed the broad term hacking, which is using a computer system to gain unauthorized access into another computer or network.
Phishing, on the other hand, has a more specific meaning. The term is a play on the word fishing because cybercriminals are dangling a fake “lure” hoping system users will bite by giving out private information. That information can be anything such as credit card numbers, account numbers, passwords, user names and more. As with most online scams, the goal is to steal money.
In the last few years, digital assistants have become all the rage. Amazon has it’s Echo powered by Alexa, Alphabet has Google Home, and even Microsoft has partnered with Samsung to deliver Cortana into everyone’s living room. On top of that, you have your smartphones that records everywhere you've been and more and more people are putting cameras all over their house and office that send video back to Cloud. It’s easy, convenient and ubiquitous. But should you be worried about what data is being sent to mega-corporations or is the convenience worth it?
On May 24th, we held our May Advantage Lunch at the Bavarian Inn. (If you haven’t heard about our Advantage Lunch, learn more at advantagelunch.com) In addition to the pictures and video below, be sure to check out our Facebook photo album!
Hacking, by definition, is using a computer system to gain unauthorized access to a computer system or network. “Hacking is not necessarily bad. Hacking is having that bug in you that says I have got to figure this out”, said the Director of Information Security at Advantage Technology. And since computers and the internet are now a major part of our society, understanding hacking and protecting your information is more important than ever.