Tech Talk

Relying on public key encryption for business

February 02, 2017 - 19:18
0 comments

Many years ago, we lived and worked in the same town. Everyone knew you and business was conducted because of your reputation. As time went by, people were able to do business across longer distances and, today, we conduct business with people from all around the world.

We don’t personally know the people we are working with and they do not know us. We rely on public key encryption to verify from whom we are receiving information and to whom we are sending information.

Surviving Computer Failure

February 01, 2017 - 08:56
0 comments

It is good to plan for computer failure. It will happen eventually and probably at the worst possible time. The first thing that you need to do is determine what you use your computer for and what information on it you need.

If determining what you use on your computer seems daunting you can back up the entire computer. There are a number of cloud based backup solutions that allow you to do continuous backups for a fee when you are online, some of the better known solutions are IDrive, Carbonite, and CrashPlan.

Tech talk: Tips to avoid cybercriminals

January 25, 2017 - 16:35

You need to be careful where you go on the Internet. There are many places that are not safe. One of the easiest things to look for is the registrar or country code of the domain. If the registrar is Eastern European, Asian, or from an unknown country you may want to find a different source of what you are looking for. You should also be wary of emails coming from these domain registrars.

For simplicity's sake give cash, not Visa gift cards

January 14, 2017 - 16:41

Rocco Maglio, Certified Information Systems Security Professional, CISSP, has over 20 years in the field of software engineering.

I recently tried to use a Visa gift card that I received over the holidays. The cashier asked me how much money the card had on it. I responded that I wanted to use the whole card towards my bill.

Tech Talk: Feel right at home with travel storage devices

January 06, 2017 - 19:49

Rocco Maglio, Certified Information Systems Security Professional, CISSP, has over 20 years in the field of software engineering.

Over the holidays, many families spend time traveling in their cars. There are number of devices that make can provide entertainment while traveling. The two devices to consider are mobile hotspots and mobile storage devices.

Lessons learned from the Podesta email hack

December 30, 2016 - 17:35

Rocco Maglio, Certified Information Systems Security Professional, CISSP, has over 20 years in the field of software engineering.

The hacking of Clinton Campaign Chairman John Podesta’s email provided a lesson for us all. It was an amazingly simple phishing email that caused his password to be revealed. An email was sent to Podesta’s gmail account saying someone had used his password to login to his account from the Ukraine and he should change his password. It included a link to change the password.

Advice on personal identifications and passwords

December 30, 2016 - 15:14

Rocco Maglio, Certified Information Systems Security Professional, CISSP, has over 20 years in the field of software engineering.

One of the most difficult aspects of security is uniquely identifying a user and verifying that they are who they claim to be. This is normally down through a username and password. The username uniquely identifies the user and the password verifies that they are that user.

Pages

Subscribe to RSS - Tech Talk