With quantum computers inching closer and closer to reality, we can anxiously anticipate new and exciting changes coming to the way computers process information. A complex concept for many to comprehend, it is sure to disrupt many industries with its power. Read more
Articles tagged: security
Technology is undoubtedly an integral part of most industries today. In order to adequately prepare students for a future that is sure to incorporate a mixed environment of human and artificial intelligence (AI) technology, schools must begin to mirror the same environment one can expect once out in the workforce.
Remote education systems, in addition to an increase in the demand for cloud technologies, is changing the way educational curriculum is delivered. A variety of technology platforms and microservices are rapidly evolving as key business models in the educational sector. Read more
While artificial intelligence or “smart” technology will soon be prevalent in a variety of industries, it is sure to revolutionize the healthcare industry in particular; an industry that will impact us all in one way or another. Whether as providers or patients we are sure to see transformation of the design and insight into treatment plans, management of medications, as well as improving efficiencies and assisting in repetitive work duties. Read more
While cloud computing has brought several benefits to the way small businesses (and non-profits alike) operate, there are some disadvantages to consider prior to becoming completely dependent on the cloud.
Perhaps the most well know concern end-users face when considering cloud migrations involve data sovereignty. As these concerns have been addressed in previous posts, we will focus here within, on other roadblocks that operating on cloud-based technology can present.
Encryption has become the most effective way for businesses of all sizes to best secure critical data. While it doesn’t prevent data from being accessible, it does render data unintelligible unless you have a secret key or password to decrypt or make the information readable.
With the introduction of Microsoft’s Windows BitLocker, business hardware (like servers, workstations, backup drives, etc.) can be protected by encryption; drastically improving the threat of data being stolen or exposed when a computer is lost or stolen. Encryption plays a significant role in data confidentiality on hardware and can be utilized in a variety of organizations including law firms, doctor office’s or businesses that supply laptops for employee’s use. Read more
As technology advances and becomes more accessible, consumers and businesses alike are able to take advantage of more cost effective, feature-rich solutions not previously available to them. Geofencing and Geo-IP filtering for hardware and software used to be a very costly tool implemented for very specific use cases. It is now technology featured in almost every smart phone, firewall or router most consumers already have in their possession, and is the foundation of several applications and services. Read more
A “golden key” or a universal back door method, allows the bypassing of normal authentication in a product, computer system or algorithm. If used ethically it can be used for securing remote access to a computer system or for debugging purposes. The controversy surrounding golden key methodology stems from the fact that in the wrong hands, it can also open up physical access to those with malicious intent.
Major hardware manufacturers like Apple, Microsoft and Blackberry have taken publicly dissimilar positions on releasing universal back doors to their devices. As the world increasingly depends on devices supplied by these few suppliers, it is important to know where they stand, so you have an idea where your sensitive personal data is likely to end up. Read more
As law firms strive to become more efficient and move towards the much sought after “paperless” office environment, cyber security must remain at the forefront of any technology initiative. But how can law firms be expected to manage and protect their network infrastructure in addition to managing client matters and cases? While technology can certainly help manage the workload, it shouldn’t have to be a part of your firm’s core competencies. Read more
Two Factor Authentication is an extra security method that can be implemented to ensure specific online applications and services are fully protected. With recent password hacks and well publicized security breaches happening to companies small and large it aims to protect your network from phishing attacks and stolen credentials. Two factor authentication can be used as a proposed solution, but how safe is too safe? Read more
Bug bounties have good intentions but in a world where cyber warfare is a reality, it can lead to complex consequences were ethics and espionage come into play. When private companies compete to outbid each other’s bounties, it can create a dangerous playing ground that could potentially put million’s of users sensitive information at risk. Read more