by Greg Scott | Dec 26, 2014 | Slice of Life
[Originally posted December 26, 2014 on my Infrasupport website, right here. I copied it here on June 21, 2017 and backdated to match the original post.] I just finished my own disaster recovery operation. There are still a few loose ends but the major work is done....
by Greg Scott | Dec 10, 2014 | Cybersecurity
By now, we’ve all read and digested the news about the December 2013 Target breach. In the largest breach in history at that time and the first of many sensational headlines to come, somebody stole 40 million credit card numbers from Target POS (point of sale)...
by Greg Scott | Jun 7, 2014 | Slice of Life
I’ve taken thousands of telemarketing cold calls over the years. Many are deceptive, most are awful. And a few are good. Here is a common deception. Many calls originate in call centers in India or the Philippines. Callers use IP phones and connect via the...
by Greg Scott | May 24, 2014 | Slice of Life
I survived one of the worst customer service experiences ever this week. We can all draw some lessons from this story. The end user customer operates branch sites across the Midwest USA and uses Infrasupport firewalls to connect to the Internet and main office in the...
by Greg Scott | Mar 26, 2014 | Cybersecurity
Sometimes when high tech meets international politics, reality really is stranger than fiction. First, a few enlightened members of our US Congress accused Chinese telecom equipment giant, Hauwei, of spying for the Chinese government. Here is one of many press...
by Greg Scott | Feb 17, 2014 | Technology
Many people will see the words, “Net neutrality” and groan about yet more tech gobbledygook and geeks who spend too much time pretending to be Mr. Spock and watching Star Trek re-runs. Nobody on Main Street cares about net neutrality, right? Isn’t this all just an...
by Greg Scott | Feb 14, 2014 | Cybersecurity
With all the IT security issues in the news lately, suddenly IT security is everyone’s problem. One natural question behind the headlines is, what is the right way to handle IT security vulnerability disclosures? Here are some thoughts. To keep things simple, let’s...
by Greg Scott | Feb 8, 2014 | Cybersecurity
Given the recent security breaches all over the news, what would a good Main Street business security solution look like and how much would it cost? After all, if organizations such as the NSA and large retailers such as Target can’t keep their secrets safe, what...
by Greg Scott | Jan 13, 2014 | Cybersecurity
The sensational IT security stories just seem to keep coming. Consider: Researchers at antivirus companies decoded a mysterious computer virus named Stuxnet, apparently authored by our own NSA and the Israelli government, designed to attack Iran’s nuclear...
by Greg Scott | Dec 24, 2013 | Cybersecurity
If you shopped at Target between 11/27/2013 and 12/15/2013, congratulations. Your credit or debit card info is one of around 40 million up for sale in a thriving underground marketplace complete with wholesalers, distributors, retailers, and easy to use websites. ...
Recent Comments