KRACK-vulnerability

What You Need to Know about KRACK Attacks

Taking a deeper look at the KRACK Wireless Vulnerability Background In May of 2017, security researcher Mathy Vanhoef published a technical paper outlining a potentially catastrophic vulnerability within an encryption protocol used within Wireless Computer Networks. This vulnerability has taken the “protected” out of Wi-Fi Protected Access II (WPA2) Wireless Networks. Those networks, both corporate…

is my copier spying on me

Is My Copier Spying on Me?

Vulnerabilities in IoT As the phrase “Internet of Things” or IoT enters our cultural vernacular, many wonder what this new term means. The Internet of Things Simply put, IoT is the term given to connecting non-traditional devices to a computer network – most notably the Internet. Businesses have been connecting “things” to the network for…

hyper-convergence

What is Hyper-convergence?

What is Hyper-Convergence?   It seems like a new buzzword or acronym is developed in the IT industry daily. As a small business, it can be difficult to cut through the noise and identify what technology is the right fit for you. Most recently, the term “hyper-convergence,” or hyper-scale computing, has made its debut. This…