Daylight Robbery at the A.T.M

Submitted by Micah Smith on Thu, 10/19/2017 - 18:02

With multifaceted and overlapping malware, ransomware, spyware and botnets, cyber criminals have to tirelessly toil away, negotiating the price of malware with other online thieves - it's a tough new world. 

So, it's nice to have some good old-fashioned bank robbers in the news, once in a while.

Time to Panic? Potential Wi-Fi Security Breach Uncovered

Submitted by Micah Smith on Tue, 10/17/2017 - 17:56

According to some recent reports, millions of Wi-Fi users around the globe might be twitching. Hot off the press, the security protocol protecting the majority of modern Wi-Fi networks, WPA2, has been cracked.

This means that traffic shared over countless wireless networks globally will become an easy target for hackers and other malicious users looking to obtain sensitive information.

Biggest Internet Security Threat Ever?

Accenture and the Amazon S3 Bucket

Submitted by Micah Smith on Fri, 10/13/2017 - 16:44

Data leaks into leading international businesses are becoming less of an irregularity and more of a frequent tech faux pas.

The cyber criminals are at it again, snubbing monster Tech companies with their hacking skills with the most recent and all too public Amazon S3 bucket breach.  Lucky for us, we all now have a greater understanding of both S3 Amazon buckets and IT choices that need to be taken by Accenture and other corporate entities.

Cyber Security Best Business practices

Submitted by Micah Smith on Wed, 10/11/2017 - 09:50

Whist we all agree that each and every business has to know and incorporate cybersecurity practices, there is a certain level of insecurity as to which road to take. Business owners remain unsure as to a safe but all-encompassing set of basic rules. With so much cybersecurity talent out there, we reached out to the professionals to give us a better understanding of how we should lay down the path ahead for small, medium and large business owners.

Trust in the Digital Age.

Submitted by Micah Smith on Fri, 10/06/2017 - 11:04

Many Americans, over 70%, are mistrustful of automation. The advent of driverless cars, robot-carers and the streamlining of basically any industry by cyber automation have not yet proven to be incredibly popular amongst the masses.

Rightly or wrongly, people feel that the creeping automation that is taking place in so many spheres is a danger. This danger extends from job security to lack of reliability, in some way always trumping the ability of humans, even in the face of clear failure against machines.

Different Approaches to Cybersecurity.

Submitted by Micah Smith on Mon, 10/02/2017 - 10:50

Cybersecurity is becoming an increasingly hot potato on the political scene. Ever since the US elections were supposedly hacked, many government offices went on high alert to conceal valuable assets - like their easy to guess passwords, along with spending habits (hat tipping and alarm bells are at this point all swerving in the direction of the current Tom Price step-down).

On-The-Go cyber-security.

Submitted by Micah Smith on Thu, 09/28/2017 - 15:56

The results are in, most of us (especially those reading the CyberHub Summit blogs) have a basic understanding of what being cyber-safer actually means.

Not only do you pay for IT security in your workspace, you probably also invest in cyber security in your private life too. Although it's now sadly safe to say, work and play in the innovative and overlapping era of disruption are heavily intertwined.

The Future of Programming Human Resources

Submitted by Micah Smith on Tue, 09/26/2017 - 16:06

In today’s millennial-driven economy, a tech-based college graduate can get a job that pays almost twice the median income in the USA. That’s if they choose to go to college at all.

Increasingly, would-be programmers can participate in coding boot camp and learn the basics in 18 months.