IT and Business Insights for SMB Solution Providers

My Information Resource

Blog Entry
July 6th, 2019 | Jay Ferron
    The U.S. Food and Drug Administration released a warning last week recalling certain Medtronic MiniMed insulin pumps over concerns that the device may be vulnerable to cyber attacks. The warning comes after researchers found that an attacker with adjacent access was able to wirelessly communicate with the device and alter the pump settings, either providing or restricting insulin to a patient. - read more
 
Blog Entry
July 6th, 2019 | Jay Ferron
    Smart locks have been increasing in popularity for the last few years. They provide a number of conveniences that make them an enticing option for people looking to replace their current locks. Things like automatically unlocking as you approach with your hands full or allowing a friend to unlock the door only when you’re on vacation sound great at first. - read more
 
Blog Entry
June 30th, 2019 | Jay Ferron
    When something is free, chances are pretty high that "the user" is the product. Services that are free usually generate value for the creator or provider by sharing exposure with advertisers or perhaps using the data collected from the "free" product for other means such as market studies or product testing before a final product. - read more
 
Blog Entry
June 18th, 2019 | Jay Ferron
 
Blog Entry
June 12th, 2019 | Jay Ferron
    Phishing attacks are perhaps the most common method attackers use to gain access to a target network. It is so common that many companies employ outside companies to generate test phishing campaigns in order to train employees on what to look out for. - read more
 
Blog Entry
June 12th, 2019 | Jay Ferron
    Over the years, app security has improved enough that developers must request permissions to areas of your smartphone that their applications need to access. Now we have some control over which apps have access to things such as your camera or extended storage. But did you know that there are still parts of your phone that require no permissions whatsoever? - read more
 

Pages

Subscribe to My Information Resource