Blog


| Posted by , under Uncategorized

 

EndPoint Protection: (AV, NGAV, EPP etc) Is like your doors, windows, gates that protect your property. It stops unwanted people from coming into your home. What to look for in Endpoint Protection: There are two main types of methods Detection based: These kind of systems have to be able to “identify” bad behaviour to

As human beings, how do we determine if information given to us is good or not?

We as the human race “Trust” or “Not Trust” the messenger (channel) of the information. Its more efficient and easier to trust the messenger than analyzing the content. Human brain does not (in the main)

You’ve probably encountered some form of home automation already, whether it’s a “hub” like Amazon’s Alexa or just a smart thermostat.

But what exactly is home automation? What does it do? And why should you care?

Let’s take a look. Automation vs. Control

It may sound strange, but not all of the

| Posted by , under Blog

One of the first things the average person thinks about when a topic like cybersecurity comes up are anti-virus programs. And usually, their thoughts will default to some of the more widely known and used versions.

“Just download (and pay for) this program”, so the popular wisdom goes, “and you’ll be

| Posted by , under Uncategorized

There is an industry that profits big buck$ by selling services for cleaning infected websites. Although on the surface you may not see anything wrong with it, but once you start thinking about incentives and alignment of these companies, you soon realize it ain’t right to kick people when they are down.