Technology

Relying on public key encryption for business

0 comments

Many years ago, we lived and worked in the same town. Everyone knew you and business was conducted because of your reputation. As time went by, people were able to do business across longer distances and, today, we conduct business with people from all around the world.

We don’t personally know the people we are working with and they do not know us. We rely on public key encryption to verify from whom we are receiving information and to whom we are sending information.

Surviving Computer Failure

0 comments

It is good to plan for computer failure. It will happen eventually and probably at the worst possible time. The first thing that you need to do is determine what you use your computer for and what information on it you need.

If determining what you use on your computer seems daunting you can back up the entire computer. There are a number of cloud based backup solutions that allow you to do continuous backups for a fee when you are online, some of the better known solutions are IDrive, Carbonite, and CrashPlan.

Tech Talk: Feel right at home with travel storage devices

Rocco Maglio, Certified Information Systems Security Professional, CISSP, has over 20 years in the field of software engineering.

Over the holidays, many families spend time traveling in their cars. There are number of devices that make can provide entertainment while traveling. The two devices to consider are mobile hotspots and mobile storage devices.

Lessons learned from the Podesta email hack

Rocco Maglio, Certified Information Systems Security Professional, CISSP, has over 20 years in the field of software engineering.

The hacking of Clinton Campaign Chairman John Podesta’s email provided a lesson for us all. It was an amazingly simple phishing email that caused his password to be revealed. An email was sent to Podesta’s gmail account saying someone had used his password to login to his account from the Ukraine and he should change his password. It included a link to change the password.

Advice on personal identifications and passwords

Rocco Maglio, Certified Information Systems Security Professional, CISSP, has over 20 years in the field of software engineering.

One of the most difficult aspects of security is uniquely identifying a user and verifying that they are who they claim to be. This is normally down through a username and password. The username uniquely identifies the user and the password verifies that they are that user.

Tech Talk: Staying safe while supporting small businesses online

Rocco Maglio, Certified Information Systems Security Professional, CISSP, has over 20 years in the field of software engineering.

The Internet has enabled small businesses to open with low upfront costs. This enables them to create a storefront on the Internet that can be reached by people all over the world.


Rocco Maglio, CISSP

Pages