Do honest working hackers exist?

The word “hacker” conjures up an image of a hoodie-wearing basement dweller that programs all sorts of malicious attacks to infiltrate their target’s computer. But hackers are so much more than that. There are also hackers that use their skills to do good. A complicated history In the 1950s, the term ‘hacker’ was vaguely defined. […]

4 BYOD security risks you should prepare for

Personal computing is with us wherever we go. Thanks to the rise of the mobile industry, smartphones and tablets allow us to take work home with us. And with the bring your own device (BYOD) strategy, businesses have never been so productive. However, BYOD can pose a number of security risks if you’re not careful. […]

Are all hackers out to do harm? Not so fast

Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so simple. Some hackers are making tremendous contributions to the field of cyber security, it just depends on which hat they’re wearing that day. Take a few minutes to learn about white, black and gray hat […]

Potential IT security issues in 2016

As a small or medium-sized business owner or manager, it’s only to be expected that you want to keep your company safe from cyber attacks and hacking attempts. But how much do you really know about online safety? With massive corporations such as Sony falling victim to attack, cyber security has never been more in […]

Little Companies…Big Hacks…by dStringer

In musing about what I was going to write in today's blog, I turned on my T.V. to get my morning news fill and there it was...another hacking story.  "Well", I told myself.  "I've written about cyber security many times.  Do I write about it again"?

Ahhh.

WHY TECHNOLOGY INTIMIDATES PEOPLE by DStringer

We at "Alcala Consulting" are constantly looking for new, innovative, and "user-friendly" ways to make the "World of Technology" less intimidating for our clients and potential clients.  Ultimately, we pride ourselves in being available to lift the "Technological Burden" off of business owners.

THERE ARE TWO KINDS OF COMPUTER SYSTEMS…THOSE THAT HAVE BEEN HACKED…AND THOSE THAT WILL BE HACKED…by d.stringer

The latest news about the "hacking" of Anthem last week has most wondering if anything can be done to stop the "bad guys."  Well, yes and no.  While it is true that everyone is vulnerable; make no mistake about that, there are ways that you can make your system "less attractive" to a would-be hacker.