March 6th, 2014
How much is your antivirus software really protecting your computer? Wait, what is antivirus software?
Most people know the bare minimum. It’s a program you run on your computer that prevents, detects and eliminates several types of malware, viruses, worms and whatever else hackers throw your way. We don’t really know how it works. We just know that it does. And we don’t necessarily want to spend money on it either.
What you may not know is that there are many components that make up an effective antivirus program. Does paying for antivirus software actually makes a difference?
See if your current software meets the standard. (more…)
March 6th, 2014
Unethical hacking and cyber crime occurs at a personal and corporate level. Companies require digital allies to combat the data breaches and intrusions.
Not one company or person is completely 100% bulletproof against unethical hackers. Even if you’re a seasoned ethical hacker and cyber security pro, daily interactions, social media usage, and other factors take security out of your hands.
The recent Target, Neiman Marcus, and Michael’s, and UMD data breaches are simple examples of cyber security falling short and forfeiting your personal info. For the retail industry, unless you pay cash for every transaction, you’re vulnerable to the business’ security. And let’s face it, most U.S. businesses, devoid of their size, are not prepared for this wave of data breaches sweeping the nation.
Despite the weakness of security, we must turn to security professionals, more specifically “White Hat” hackers to fortify our defenses, plan for potential breaches, and create response plans to deal with damage. (more…)
February 28th, 2014
If you read our 2013 IT Salary Report and Guide, you already know that some big bucks can be made in the NY-NJ area for IT jobs. You also know that the size of your paycheck depends on your location.
To find out where exactly you should consider living to make the most of your big city paycheck, visit our report and scroll down to the #30 and #32 states in the US. But to discover what jobs are hiring in this lucrative area, stay put as we breakdown the top 5 jobs available now in the New York and New Jersey metropolitan area. (more…)
February 28th, 2014
Humble Beginnings and Bold Prophecies
Born out of the nurturing environment of the Betamore technology incubator, ZeroFOX has become one of Baltimore’s most notorious startups. Since their launch in January 2013, headlines in major newspapers and stations continue to generate buzz around the innovative venture. Among their accolades are Maryland Cyber Company of the Year and BBJ Top 5 Cyber Companies to Watch.
All this attention could go to anyone’s head. But acclaimed CEO, best-selling author, and industry expert James C. Foster probably didn’t need the ego-boost. He firmly stated in interviews that the performance of cyber security companies today is unacceptable. They fail to identify attacks. His platform replaces these “outdated” strategies. As a result, ZeroFOX attacks main challenges and sets out on a mission to solve them.
February 27th, 2014
If we have a bad day, everyone needs to know about it. Stuck in traffic? You should probably complain about it via Twitter. Was the sunset pretty? Hurry! Make sure you post it to Instagram!
Everyone feels the need to share milestones in their lives – college application letters, engagements, babies, job promotions, vacations, pictures from a night out. From Twitter to Tumblr, we have access to the most intimate information, shared willingly by the user.
Even if you don’t actively use social media, just being a part of the digital world has a consequence. Everything you do leaves a digital footprint. It’s important to make sure that footprint won’t come back to haunt you.
February 21st, 2014 -
Stories reporting the University of Maryland data breach flooded the news headlines two days ago. UMD President Wallace Loh released a letter to students, staff, and faculty explaining the present situation.
In the letter, he says “309,079 records” containing names, Social Security numbers, dates of birth, and University ID numbers were compromised. Who is to blame?
Was it possibly a Duke student or fan? Is a 69-67 final loss against Duke not enough? Was it a parting gift for UMD leaving the ACC? (more…)
February 21st, 2014 -
You probably already realized that our business focuses on providing IT Training. We are the people you seek out for that extra cert to land the dream job. But we know all too well that the job hunt sucks. Unless you’re truly motivated to leave your current position, you probably only invest half the effort.
We understand this little fact of life. So we decided to put in the other half of the effort you’re missing to land your dream job. Below are five IT-related jobs posted this week on LinkedIn for the Maryland, Virginia and Washington, DC metropolitan area. (more…)
According to the PEW Research Center, 52% of Americans used a public library in 2013.
While this study found libraries are still embraced by Americans overall, it also found that many are not sure as to whether libraries provide any added advantage in finding information. However, our research discovered that one Maryland library in particular successfully managed to embrace and integrate technology, for its community to utilize.
Phoenix TS will be at the RSA Conference in San Francisco from February 24th – 28th, 2014. The RSA Conference hosts one of the world’s largest gatherings of security pros who “connect to protect.” They come together for one week to share knowledge and developments in the cyber security industry.
If you’ll be there, make sure to stop by the Phoenix TS booth #2328, in order to connect with cyber security expert and RSA keynote speaker, Ira Winkler, and learn how our team of trainers plan on changing the world of cyber security through education in 2014! (more…)
While malware infections are commonly reported by desktop and laptop PC users, especially those running the Windows operating system, they are not the only ones at risk. Mobile malware is predicted to be a leading security concern throughout 2014.
As the popularity and usage of mobile devices, such as tablets and mobile phones, has increased over the years, so has the number of programs designed to exploit these systems. In the second half of 2013 alone, the amount of malware specific to Google’s Android OS grew by 33%. This operating system also faces about 90% of all mobile malware threats; malware authors will intentionally design their programs to target Android because it currently holds the highest percent of the entire mobile phone market. Malware programs are not as frequently identified as targeting BlackBerry, iOS or the Windows platforms, but that’s not to say that these systems are completely immune to the risk. (more…)