Blogs

Learning more about the government's rigorous cyber security standards

Two Advantage Technology professionals recently returned from the preeminent event for training, education and workforce development for protecting the country’s infrastructure from cyber threats.

The National Cyber Summit took place in early June in Huntsville, Ala. The annual event attracts commercial and defense companies as well as healthcare, automotive and energy industries and academia. It was sponsored by Information Systems Security Association.

Randy Ross and Rob Dixon from Advantage Technology were on hand to learn and to network with other providers.

The Technology Buying Cycle: How Often Should Your Business Update Its Technology?
Technology Buying Cycle

In order for a business to operate at the highest and most effective level, companies must repeatedly reexamine their sense of purpose and make sure the organization serves it well. Possessing such a strong sense of purpose needs constant support from its employees, and those employees need tools to serve that purpose. Providing the right technology tools for employees and management is one of the most important aspects of a successful business.

Use the Snipping Tool to capture screenshots

How often does it happen that you’re working on something and have an error come up or something on the screen just looks? You call tech support and spend 20 minutes trying to describe what the screen looks like and then, after your blood pressure goes back down, the technician still has to come over to take a look or establish a remote session.

What is Phishing?
Phishing

In our last blog, we discussed the broad term hacking, which is using a computer system to gain unauthorized access into another computer or network.

Phishing, on the other hand, has a more specific meaning. The term is a play on the word fishing because cybercriminals are dangling a fake “lure” hoping system users will bite by giving out private information. That information can be anything such as credit card numbers, account numbers, passwords, user names and more. As with most online scams, the goal is to steal money.

Is Big Brother watching (or listening)?
Spy Camera

In the last few years, digital assistants have become all the rage. Amazon has it’s Echo powered by Alexa, Alphabet has Google Home, and even Microsoft has partnered with Samsung to deliver Cortana into everyone’s living room. On top of that, you have your smartphones that records everywhere you've been and more and more people are putting cameras all over their house and office that send video back to Cloud. It’s easy, convenient and ubiquitous. But should you be worried about what data is being sent to mega-corporations or is the convenience worth it?

Pages