echoudhury77May 33 minWorking from Home? Here's why Awareness is a PriorityLiving through the pandemic has driven shifts in the way people socialize, eat, and work. Businesses worldwide were forced to shut down...
echoudhury77Apr 223 minRussian Cyber AttacksIn a recent turn of events, the conflict between Russia and Ukraine has been in full development. Although the tension has been building...
echoudhury77Apr 216 minCredit Card TheftIn about a decade, the popularity of using plastic cards as a form of payment has risen; it is now more uncommon to find someone paying...
echoudhury77Mar 153 minCyber War - Anonymous and The Russian Invasion of UkraineIn a recent turn of events, the Russian invasion of Ukraine has been in full development. Although the tension has been building up for a...
echoudhury77Jan 242 minStop using "Free" Wi-Fi!Wi-Fi is everyone’s best friend when you want to watch videos or download things on your mobile devices. The internet speed of a mobile...
echoudhury77Jan 185 minBotnetsBotnet is used to refer to a collection of computers linked together to automate tasks. Generally, botnets themselves are not a threat to...
echoudhury77Jan 122 minThe Dark Sides of the WebThe terms “deep web” and “dark web” are used interchangeably, however there is a difference between the two. Deep web refers to anything...
echoudhury77Dec 30, 20213 minUse Bitlocker. Here's why.There are numerous ways to secure your drives to prevent your files from being stolen off your hard drive. Securing your hard drive has...
echoudhury77Dec 15, 20213 minMetadata is a treasure trove.When using your computer, there is a lot of data created beyond what is normally accessed by individuals. Such information can include...
echoudhury77Dec 9, 20212 minDisaster Recovery-as-a-Service (DRaaS)Disaster recovery as a service (DRaaS) is a cloud computing software service model that allows an organization to back up it data and...
echoudhury77Dec 6, 20212 minKnow your Technological RightsThe United States government has long claimed that Fourth Amendment protections prohibiting warrantless searches don’t apply at the...
echoudhury77Dec 2, 20213 minCheck your Ports. They're Hacker Candy.Ports in cyber safety is very important. However, ports may refer to a variety of different things depending on the situation. For one, a...
echoudhury77Dec 2, 20214 minSetting up your New Device!In this day in age, it is very common to replace devices frequently. On average, a person replaces a phone every two years, if not...
echoudhury77Dec 2, 20213 minDon't Wait to Update! One of the biggest annoyances in the IT world are updates. Although they may be annoying and have the bad reputation of kicking in at the...
echoudhury77Nov 19, 20213 minWhy your Business NEEDS a Firewall and why it SHOULD be a Sophos XGS FirewallBrowsing the internet comes with a couple of downsides. One being that your always at risk of a cyber threat. For this reason, most if...
echoudhury77Nov 19, 20213 minDeepfake...the Good, the Bad, the UglyWhat if someone could fake your identity, not on paper with a fake I.D., but on a video as if you would’ve taken a video yourself? That...
echoudhury77Nov 17, 20212 minHow Blockchain is Revolutionizing TransactionsUnless you are involved in the cryptocurrency world, blockchain may be a little unfamiliar. Even those involved with crypto may have a...
echoudhury77Nov 15, 20212 minThe DANGERS of "Free" Wi-FiMany users don't understand the risks of public Wi-Fi, even though companies have started to give users a warning when they connect to an...
echoudhury77Nov 3, 20212 minHit by Ransomware? Here's what to do.What is ransomware? Ransomware can be one of the hardest form of malware to recover from. Cyber criminals use different ways of entries...
echoudhury77Nov 1, 20212 minDeep Learning vs. Machine LearningMachine learning and deep learning are vital to daily Internet activities everywhere. It’s how Netflix knows which shows you are...