Blog

What is a good password

What is a Good Password?

Oct
27
‘17
security

Maybe a better question is, “Do passwords matter?”  I’ve seen password requirements become more and more painful through the years at the same time that the number of security breeches has skyrocketed.  The reason is that investing time in hacking into the online application database is far more rewarding than brute-force hacking a single end user’s password.  In other words, all the secure passwords in the world won’t do any good when a hacker (or state-sponsored team of hackers) can simply siphon my data out the back end.  Providers and online vendors should care more, and we should make

Complex Computer Networks

Despite the Promises, Computer Networks are Getting More Complex

Oct
27
‘17
networking
If there ever was an industry that perpetually promises “New and Improved,” it’s the IT industry. I can’t think of another high-ticket item that loses value and performance as quickly as a computer does. Selling a two-year-old computer is nothing like selling a two-year-old car, for example. You get my point.
HIPAA Compliance

Can You Outsource Your HIPAA Compliance?

Aug
08
‘17
HIPAA
HIPAA Compliance is “the elephant in the living room” these days. Companies that fall under its rules generally know it, but alarmingly few companies do anything to even assess their current adherence to the rules. It’s like they would rather not know.
What is your data

What and Where is Your Data?

Mar
03
‘17
Big Data
When I ask people if their data is being backed up regularly, the answer is almost always “yes.” When I dig deeper, I almost always find some portion of their data that is not being backed up regularly. Where’s the disconnect? I have decided that the confusion usually revolves around the word “data.”
Missing the Mark

Missing the Mark

Jan
31
‘17
Uncategorized
Gerald is a long-time owner of a substantial construction business, and like most successful business owners, he trusts his own wits and intuition in making business decisions. His keen mind is ultimately what got him to success, so why not keep betting on a winner? Gerald had a big problem with his computer network, but he just didn't know it yet.

Is the Internet of Things Worth It?

Jan
30
‘17
internet
Nearly half of U.S. companies experienced a ransomware attack last year. The Internet of Things (IoT) appears to be making it easier for hackers to target networks due to the complexity of securing IoT devices. Businesses are adopting IoT gadgets by the billions and it is often difficult to know if they’re opening a back door to your network security.
Ransomware

Ransomware – The Cybercrime Plague that is Infecting the Globe

Mar
29
‘16
security
NOTE: I want to give you a bit of a warning before I start this article. My writing style is generally up-beat, jovial and fairly casual. Don’t let this style mask the fact that today’s topic is very serious. Please know that this article is written in a spirit of urgency and importance..
Virtual Desktops VDI

Virtual Desktops: Not Just a Coming Fad

Mar
03
‘16
Virtual Desktops
Virtual Desktops, sometimes referred to as “Cloud Desktops,” are the next major improvement vastly approaching the computer network landscape (actually, this new technology is already in production today – we use it here at Promethius). We’ve been in business for over sixteen years, and we think this technology will be the biggest “game changer” we have ever seen.

Will You Recover?

Aug
10
‘15
backup

I gained a deep understanding of “disaster recovery” in the best situation imaginable.  I was a programmer/analyst for Northern Trust Bank, and for two years worked diligently on our “Y2K” disaster preparedness plan.  To say the least, banks cannot afford to lose their data.  The fear surrounding Y2K gave me an almost unlimited budget and access to endless resources.

Pages