Author Archives for Gavin Mish

statue at the Lincoln Memorial in Washington DC

Cyberthreats in Political Campaigns

February 19, 2020 11:52 am Published by Comments Off on Cyberthreats in Political Campaigns

With the 2020 presidential elections nearly upon us, campaigns are growing, and donations are increasing. With the nation’s collective attention shifting to these political races, we figured it would be a good idea to examine the cyberthreats that these political campaigns are facing. By drawing on recent history as well as examining new threats, the possibilities of cyberattacks on political...


Two boys having a pillow fight on a bed

How to Ensure your Children are Safe on the Internet

February 16, 2020 11:35 am Published by Comments Off on How to Ensure your Children are Safe on the Internet

Over recent months, YouTube has come under fire for not taking online security of children seriously. In response, they rolled out massive changes to their platform, making child security one of their top priorities. Unfortunately, most of the internet is not designed for the safety and security of children. As a result, much of that responsibility falls on parents and...


Three Computer Screens

A Deep Dive on RansomWare

February 14, 2020 3:05 pm Published by Comments Off on A Deep Dive on RansomWare

In the year 2020, most people are pretty familiar with the concept of ransomware. As one of the major threats presented to both individuals and organizations, ransomware is something everyone needs to be aware of. But what, exactly, is it, and how can you prevent it? We set out to answer these questions and more in this blog. Read on...


Army running into war

The Threat of CyberAttacks From Other Countries

February 11, 2020 2:42 pm Published by Comments Off on The Threat of CyberAttacks From Other Countries

As the American and Iranian conflict escalates, people are beginning to wonder what exactly a war with Iran would look like. The imagery that comes to mind first is bombs dropping from the sky and boots on the ground, but there are other possibilities for war in the 21st century that don’t all involve physical violence. The threat of cyberattacks...


doorbell camera

The Ring Camera Hacks: What Actually Happened?

February 9, 2020 2:14 pm Published by Comments Off on The Ring Camera Hacks: What Actually Happened?

You’ve most likely heard in the news about the camera hacks that have left families startled, scared, and confused. The company that’s been the victim of these attacks, “Ring”, has released information on how hackers gained access into the devices. The attacks revolved around hackers accessing indoor security system cameras, meaning they were able to watch families in the comfort...


Mug that says the word, "begin"

A Guide to Cybersecurity for Startups

February 5, 2020 1:30 pm Published by Comments Off on A Guide to Cybersecurity for Startups

Starting a business takes a high level of knowledge, courage, and collaboration. And while the process of starting an organization is surely a process full of optimism, protecting the newfound company from cyber threats is something that absolutely should not be forgotten. Cyberattacks can bring even the largest companies to their knees, and put smaller companies out of business. Here’s...


City lit up at night

What you can Learn From The Biggest IT Breaches of 2019

February 2, 2020 11:12 am Published by Comments Off on What you can Learn From The Biggest IT Breaches of 2019

With 2019 in the rearview mirror, we thought it would be a good time to reflect on some of the biggest IT breaches of the year, and see what we can learn from them. WIth cyberthreats constantly growing, there is no shortage of significant attacks to choose from. The key to this article is finding breaches that also offer insight...


Dashboard inside a car

The Potential IT Concerns of Smart Cars

February 1, 2020 11:38 am Published by Comments Off on The Potential IT Concerns of Smart Cars

Technological advancements have filled our daily lives with convenience. And while these technologies are almost always designed for the greater good, there are undoubtedly ways that technology is abused, either intentionally or carelessly. As cars get smarter, they are also becoming more and more vulnerable to cyberattacks. In this blog, we’ll cover a few of the potential IT concerns with...


Woman on phone

3 Ways to Keep your Personal Devices Secure

January 27, 2020 11:08 am Published by Comments Off on 3 Ways to Keep your Personal Devices Secure

We often focus on ways that businesses and organizations can keep their networks and devices secure, but personal mobile devices are also at risk in the digital age. While it can seem overwhelming, there are a few simple steps you can take to keep your devices, and your information, secure. #1. Secure Passwords & Passcodes The good news is that...


What do IT companies really do?

How to Implement New Technologies in Your Workplace

January 26, 2020 11:21 am Published by Comments Off on How to Implement New Technologies in Your Workplace

Technology seems to become outdated quicker than ever in today’s world. As technology rapidly advances, new models of products and new versions of software seem to be released constantly. If you’ve recently invested in upgrades to equipment or software, read these tips before you implement those new systems into your workplace. Inform People of the Change Ahead of Time Give...


Woman sitting on bed with laptop

3 Signs your Laptop Needs to be Replaced

January 22, 2020 9:46 am Published by Comments Off on 3 Signs your Laptop Needs to be Replaced

In today’s world, it can be difficult to decide when it’s time to replace your current devices with newer models. Just because a device is still running doesn’t necessarily mean it’s functioning to the best of its abilities. But how do you know when it might be time to replace your laptop? Here are a few signs that your laptops...


Man sitting on laptop in dark room

4 Ways to Identify Phishing Emails

January 19, 2020 9:30 am Published by Comments Off on 4 Ways to Identify Phishing Emails

For a short period of time, it seemed as if phishing emails, which are emails that attempt to get you to click on a link which then infects your computer with malware, were declining. But just when the general public began to catch on to these sneaky attacks, the methods of the cybercriminals evolved. By using artificial intelligence to craft...