top of page
Search


Cheese Pizza and The Dark Web
The emergence of the internet and its pervasiveness has changed many things about our society. As the internet has become a larger part...

echoudhury77
Sep 15, 20223 min read
540 views
0 comments


The Human Factor: the weakest link
Owning a business comes with grave responsibility. Generally, business owners are responsible for stability, growth, direction and daily...

echoudhury77
Sep 12, 20226 min read
21 views
0 comments


Augmented Reality is NOT Virtual Reality
Augmented Reality, ‘AR’ for short, is a type of interactive software that has become more common as we advance in the world of...

echoudhury77
Sep 6, 20222 min read
18 views
0 comments


Cyberbullying is Harassment
Cyberbullying is an invasive destructive form of harassment that can leave an lasting impact on children and teens. Reports show that 85...

echoudhury77
Aug 26, 20222 min read
25 views
0 comments


The Power of Cloud Sandbox
When companies form partnerships, many things are taken into consideration. Such considerations include: reputation, return in...

echoudhury77
Aug 24, 20223 min read
24 views
0 comments


Realities of ID Theft
Identity theft affects 15 million Americans every year, resulting in 50 billion dollars in financial loss. This is on the rise; every 14...

echoudhury77
Aug 18, 20223 min read
27 views
0 comments



echoudhury77
Aug 12, 20220 min read
30 views
0 comments


Simple steps to better Small Business security
Keeping up with cybercrime can be difficult. Cyber criminals have become more advanced and smarter with their attacks. Often, smaller...

echoudhury77
Aug 12, 20222 min read
26 views
0 comments


Cybertrafficking: the Evolution of Human Trafficking
Human trafficking has been an issue for as long as the modern world has been around. Like any other business, as the internet increased...

echoudhury77
Aug 12, 20222 min read
29 views
0 comments


Sextortion is a Serious Crime
Sextortion is a serious crime that occurs when someone threatens to expose/post sensitive images or videos of their victims, often as a...

echoudhury77
Jul 22, 20222 min read
44 views
0 comments


Zero Trust
Originally, the basic assumption was that everything within the security perimeter was secured. Most data was secured in the confines of...

echoudhury77
Jun 30, 20222 min read
29 views
0 comments


Risks of Bringing Your Own Device
BYOD or Bring Your Own Device is a policy that refers to the use of personal devices being used in the workplace. This is not necessarily...

echoudhury77
Jun 29, 20222 min read
23 views
0 comments


Virtual Reality
Virtual reality has become the craze over the past few years. Virtual reality is a computer generated simulation that displays 3-D images...

echoudhury77
Jun 28, 20222 min read
18 views
0 comments


Cookies and You
What are cookies? Cookies are small files which contain pieces of data that are used to identify your computer when you are on a network....

echoudhury77
Jun 27, 20222 min read
19 views
0 comments


Encryption Prevention
The threats of cyberattacks is an ever-growing problem. Most cyberattacks are caused by encrypted viruses. Encrypted viruses are a type...

echoudhury77
Jun 23, 20223 min read
15 views
0 comments


Cybercrimes...every minute
Cybercrimes are committed every day. It is crucial that businesses are aware and stay up to date on the possible threats that may affect...

echoudhury77
Jun 23, 20222 min read
19 views
0 comments


Back to Basics: The Hard Drive
A hard drive is a storage device that stores your data files, applications and operating system. Other computer components work together...

echoudhury77
Jun 23, 20222 min read
12 views
0 comments


Virtualize Everything
What is Virtualization/Virtual Machines? Virtualization is essentially just creating a virtual version of a product or device; it can be,...

echoudhury77
Jun 22, 20223 min read
17 views
0 comments


Has your Mobile Device been Hacked?
Since people are on their phones all the time it is easy to detect a change in its normal functions. Whether it’s a change in the way...

echoudhury77
Jun 21, 20223 min read
26 views
0 comments


IoT: The network that surrounds us
What is IoT? IoT, or Internet of things, is a term that is used to refer to devices that connect to the internet. The interesting part of...

echoudhury77
Jun 3, 20223 min read
21 views
0 comments
bottom of page