WHAT WE DO WELL...
We live and breathe technology and have unique expertise in the following...
Cyber Security Assessment
Security Awareness Training
Hands on, real life scenarios
with demonstrations, whiteboarding
minus the marketing/sales fluff!
- Security Awareness
- Real Life Networking
- Practical Privacy
Advanced Configuration: Wireless, Routing, Switching, Security, VoIP, Data Centers, Servers, Virtualization
Cabling: Termination, Testing
Support & Maintenance
Let technology be the catalyst for success
Support & Maintenance
LATEST Blog articles
A wide array of random tech articles, tips, shortcuts, configurations, troubleshooting, etc ....
The enemies of today are well equipped with the latest tools and techniques, knowledge on vulnerabilities and zero day attacks. On the flip side, most companies and individuals are not. Reasons for Lapse in Security Most organizations don’t take security seriously until they get affected. They do not see tangible results It is not their […]
First and foremost, this is an awesome domain name!!! Whois shows it was registered in 1997! But I’m sidetracking. This is CloudFlares privacy focussed DNS service. DNS recap: Just like your phone book translates names into phone numbers, DNS translates URLs (like google.com) to it’s actual IP address (like 188.8.131.52) which no one has the […]
What is GDPR? GDPR (General Data Protection Regulation) is the new EU regulation around data privacy. It primarily highlights that their citizens data should be fully in the control of the citizen and with complete transparency on how it’s used. In a nutshell, the exact opposite of what happens with user data in the US. […]
Software vendors are going to kill me for saying this, but you don’t have to break the bank with software costs. There are FREE alternatives. Vendors may debate over which are better. But that decision has to be made on a per software basis and per use-case. As long as you have good support, Open […]
Gone are the days when you only needed to remember 3-5 passwords. Passwords were primarily for email accounts and a handful of social media and maybe an online bank account. Now you need at least 10 accounts for literally everything, from emails, eCommerce sites, social media, cloud apps, your thermostat, all your gov sites. You […]
Death does not come to anyone by asking. It is always sudden and people never expect it. Our lives are heavily intertwined in the digital world. As such, when (not if) that happens we should be prepared from a Cyber perspective. We have hundreds of online credentials that our lives depend on. It would make the […]
Name: Wanna Cry a.k.a Wanna Crypt Type: Worm, Ransomware Target: Windows Computers running SMB file sharing Original Creators: NSA (Yes, the US gov.) EternalBlue is the exploit that was developed by the NSA most likely to be used on “we the people”. It was leaked by hackers in April 2017 and used in the WannaCry ransomware […]
There’s a lot of talk about the Deep Dark web. These words are used interchangeably, but they are very different. Surface or Clear Web This is what most of us are familiar with. Anything searchable by Google (hence indexed or crawled by search engines) is part of the Surface web 🕸. We may think that […]
Troubleshooting starts at Layer 1 – the Link Layer. So it’s important to get this right. You may say “it’s just cabling, how hard can it be?”. We’ll, read along. I’ve seen way too many people get it wrong and pay for an expert to re-do it, so I thought I’d touch upon this fundamental […]
These days all the devices have Trust Issues! In order to get rid of the warning every time you connect to the VPN using Cisco AnyConnect using the default self-signed certificate installed in the Cisco ASA Firewall, you can install a free certificate from Let’s Encrypt. They only issue 90 day certs, but free to renew […]