Another year is here and that means new challenges and new cybersecurity threats are on the way. To ensure that you are prepared for these things, you should create, or take a look at, your cybersecurity checklist. After all, preparation is exceptionally important when it comes to your cybersecurity. Let’s take a look at…

Read More

  Getting hacked is a threat that looms over all of us every day. It takes constant vigilance to avoid the malicious intent of hackers, and it helps to know the signs of a security breach. Today we’re going to be taking you through some of those signs so that you can stay one step…

Read More

The Bowie Seniors Computer Club is committed to helping senior citizens navigate the often-complex world of technology. Recently, our very own President and CEO, Brian Dykstra, gave a presentation at the Bowie Seniors Computer Club about computer security trends. This presentation was hailed as a huge success, garnering a lot of admiration for Brian’s informative…

Read More

  The Cloud holds about 10% of the world’s data at present despite having many benefits. Cloud Services are cost effective and have added layers of security that traditional, in-house storage does not. Why are people still dragging their feet on switching over? It all comes down to security and trust. How can you trust…

Read More

  On October 21st, a major server-providing company was attacked with a widespread DDoS attack. Dyn, the company in question, provides servers for major companies like Twitter, Netflix, and LinkedIn. The attack brought down these sites and many more for end users on the east coast. The spokesperson for Dyn insists that they never experienced…

Read More

  The internet has come a very long way in a handful of years. What was once something people “fooled around with” in their off-time has become an essential tool for business, networking, and daily life. The problem with many end users, be they companies or civilians, is that they are not adapting with the…

Read More

  The short answer to this question is: Yes, most likely. All company networks at all levels could benefit from the value of penetration testing. However, you might be wondering what exactly penetration testing is and why it matters. Today we’ll be going over exactly that.

Read More

  The information age has brought with it many wonderful advances in medical research and devices, but sometimes the systems of defense just can’t keep up. Things as essential as pacemakers and insulin pumps are operating off of networks, just like a set of speakers. Though this allows for a greater range of use for…

Read More

  Sometimes particularly vicious instances of malware are remembered and named. These infectious programs have wreaked serious havoc throughout the internet, costing billions of dollars in damages and lost revenue. Today we’re going to be going over some of the most famous malicious programs to ever come across the internet and what we can learn…

Read More

  Sometimes the easiest way to get into your machine is to just ask. Phishing attacks utilize the power of social engineering to manipulate you into allowing cyber criminals to infect or infiltrate your network. These tactics are quite clever, and to combat them you need to be even more clever. Today we’re going to…

Read More