The Latest Cybersecurity Threat: Banking Trojans

The Latest Cybersecurity Threat: Banking Trojans

By | Cybersecurity, Email Security, Hacking, Network Infrastructure & Security, Viruses, Trojans, Ransomware and other Malware

Trojans are a broad category of malware that was first described as a theoretical computer vulnerability by the US Air Force in 1974. Since then, they’ve become some of the most insidious and dangerous types of malware in existence. One type, known as the banking trojan, specializes in stealing financial…

Read More
Can Facial Recognition Technology Enhance Public Safety?

Can Facial Recognition Technology Enhance Public Safety?

By | Law Enforcement & First Responders, Public Safety, Public Service, Security & Surveillance

Facial recognition technology is a highly controversial topic that’s sweeping through the United States, sparking debate about its place (or lack thereof) in the modern environment. Already implemented elsewhere around the world, the US has seen only relatively minimal adoption of the technology in a few isolated scenarios. However, in…

Read More
How Resilient Infrastructure and Technology Is as Important as Disaster Recovery

How Resilient Infrastructure and Technology is as Important as Disaster Recovery

By | Business Continuity & Disaster Recovery (BCDR), Cloud Computing, Compliance/Regulations, Cybersecurity, Data Security & Backup, Network Infrastructure & Security

Disaster recovery planning is a necessary part of business planning, but it involves more than just preparing for the worst-case scenario. Building resilient infrastructure and technology is just as important. By taking this approach, a company ensures that it has the means to respond and adapt to sudden, unpredictable events…

Read More