Hackers are known by the general public as cybercriminals, especially with so much news about nude celebrity photos beings released to the cloud, millions of customer information being stolen across many industries, and government agencies paying the ransoms hackers demand so that the former can regain access and control of their systems. However, did you […]
The word “hacker” conjures up an image of a hoodie-wearing basement dweller that programs all sorts of malicious attacks to infiltrate their target’s computer. But hackers are so much more than that. There are also hackers that use their skills to do good. A complicated history In the 1950s, the term ‘hacker’ was vaguely defined. […]
Personal computing is with us wherever we go. Thanks to the rise of the mobile industry, smartphones and tablets allow us to take work home with us. And with the bring your own device (BYOD) strategy, businesses have never been so productive. However, BYOD can pose a number of security risks if you’re not careful. […]
Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so simple. Some hackers are making tremendous contributions to the field of cyber security, it just depends on which hat they’re wearing that day. Take a few minutes to learn about white, black and gray hat […]
As a small or medium-sized business owner or manager, it’s only to be expected that you want to keep your company safe from cyber attacks and hacking attempts. But how much do you really know about online safety? With massive corporations such as Sony falling victim to attack, cyber security has never been more in […]
In musing about what I was going to write in today's blog, I turned on my T.V. to get my morning news fill and there it was...another hacking story. "Well", I told myself. "I've written about cyber security many times. Do I write about it again"?
We at "Alcala Consulting" are constantly looking for new, innovative, and "user-friendly" ways to make the "World of Technology" less intimidating for our clients and potential clients. Ultimately, we pride ourselves in being available to lift the "Technological Burden" off of business owners.
THERE ARE TWO KINDS OF COMPUTER SYSTEMS…THOSE THAT HAVE BEEN HACKED…AND THOSE THAT WILL BE HACKED…by d.stringer
The latest news about the "hacking" of Anthem last week has most wondering if anything can be done to stop the "bad guys." Well, yes and no. While it is true that everyone is vulnerable; make no mistake about that, there are ways that you can make your system "less attractive" to a would-be hacker.