top of page
Search


The T-Mobile Breaches
On January 19th T-Mobile reported another breach of their data, this being their second in as many years and their 8th since 2018. This...
echoudhury77
Jan 31, 20232 min read
15 views
0 comments


STOP using Remote Desktop Web Access!!
Remote Desktop Web Access (RDweb) is a web based remote desktop client. It was created by Microsoft to allow remote access to programs...
echoudhury77
Nov 1, 20223 min read
223 views
0 comments


SIM + SEM = SIEM | And why you NEED it
In the digital world we live in today it is safe to say that security for all devices should be a priority. With many bad people who want...
echoudhury77
Oct 14, 20223 min read
48 views
0 comments


echoudhury77
Aug 12, 20220 min read
30 views
0 comments


Simple steps to better Small Business security
Keeping up with cybercrime can be difficult. Cyber criminals have become more advanced and smarter with their attacks. Often, smaller...
echoudhury77
Aug 12, 20222 min read
26 views
0 comments


Zero Trust
Originally, the basic assumption was that everything within the security perimeter was secured. Most data was secured in the confines of...
echoudhury77
Jun 30, 20222 min read
29 views
0 comments


Risks of Bringing Your Own Device
BYOD or Bring Your Own Device is a policy that refers to the use of personal devices being used in the workplace. This is not necessarily...
echoudhury77
Jun 29, 20222 min read
23 views
0 comments


Virtualize Everything
What is Virtualization/Virtual Machines? Virtualization is essentially just creating a virtual version of a product or device; it can be,...
echoudhury77
Jun 22, 20223 min read
17 views
0 comments


Relying on Research Companies
Decision making for a business, accounts for some of the biggest and most stressful parts about owning/managing, and running a business....
echoudhury77
May 11, 20223 min read
15 views
0 comments


Use Bitlocker. Here's why.
There are numerous ways to secure your drives to prevent your files from being stolen off your hard drive. Securing your hard drive has...
echoudhury77
Dec 30, 20213 min read
133 views
0 comments


How UCaaS/VoIP Elevates what phones can do
Communication at the office setting is very vital. It allows your workers to interact with the customers efficiently. The most important...
echoudhury77
Dec 15, 20212 min read
14 views
0 comments


Metadata is a treasure trove.
When using your computer, there is a lot of data created beyond what is normally accessed by individuals. Such information can include...
echoudhury77
Dec 15, 20213 min read
18 views
0 comments


Why you should use a Lenovo
When it comes to computers for Business, here's why you should use Lenovo. 1. Reliability Lenovo’s is made for durable and reliable...
echoudhury77
Dec 7, 20212 min read
24 views
0 comments


Check your Ports. They're Hacker Candy.
Ports in cyber safety is very important. However, ports may refer to a variety of different things depending on the situation. For one, a...
echoudhury77
Dec 2, 20213 min read
17 views
0 comments


Setting up your New Device!
In this day in age, it is very common to replace devices frequently. On average, a person replaces a phone every two years, if not...
echoudhury77
Dec 2, 20214 min read
16 views
0 comments


Don't Wait to Update!
One of the biggest annoyances in the IT world are updates. Although they may be annoying and have the bad reputation of kicking in at the...
echoudhury77
Dec 2, 20213 min read
15 views
0 comments


Why Cable Matters
One of the most important things that people forget about, like when building a new computer rig, are cables like audio, internet, and...
echoudhury77
Nov 23, 20214 min read
25 views
0 comments


The DANGERS of "Free" Wi-Fi
Many users don't understand the risks of public Wi-Fi, even though companies have started to give users a warning when they connect to an...
echoudhury77
Nov 15, 20212 min read
19 views
0 comments


The Dangers of 5G
Phones are the facilitators and portal to the future. In just a little over 30 years, with the invention of the first touchscreen phone...
echoudhury77
Nov 3, 20213 min read
21 views
0 comments


Hit by Ransomware? Here's what to do.
What is ransomware? Ransomware can be one of the hardest form of malware to recover from. Cyber criminals use different ways of entries...
echoudhury77
Nov 3, 20212 min read
19 views
0 comments
bottom of page