Cybersecurity or information technology security is the protection of computer systems and networks from the theft of or damage to hardware, software, or electronic data as well as from the disruption or misdirection of the
Read more →A logic bomb is a piece of code, a set of instructions secretly and intentionally inserted into a software system, so that if particular conditions are met it will “detonate,” setting off and carrying out
Read more →In an article by Frankie Wallace on January 16, 2020 from U.S. Cybersecurity Magazine entitled, “Steps Businesses Must Take to Prevent Data Breaches”, the author writes about various ways a business can reduce the risks
Read more →In an article from US Cybersecurity Magazine on December 16, 2019 by Caleb Townsend entitled, “The Biggest 2020 Cybersecurity Threats”, cybersecurity threats were a monumental problem in 2019 and will continue to be so going
Read more →In an article by Caleb Townsend entitled, “Safe Apps: How Can You Tell?” from Cybersecurity Magazine on December 4, 2019 he indicated that safe apps can be contaminated through vulnerabilities. These vulnerabilities allow dangerous malware
Read more →Following a natural or human-induced disaster, is your business ready with a Disaster Recovery Plan? In an article by Magnus Knight entitled, “What You Need To Know About Disaster Recovery Planning,” from US Cybersecurity Magazine
Read more →
RECENT COMMENTS