IT jargon: a glossary of cybersecurity terms

IT jargon: a glossary of cybersecurity terms

Everyone hates jargon. It’s ostracizing and off-putting, but somehow we just keep creating more and more of it. For those who have adopted an “if you can’t beat ‘em, join ‘em” philosophy, we have just the list for you. Let’s take a look at some of the most relevant cybersecurity terms making the rounds today.

Hardware shouldn’t be bought willy-nilly

Hardware shouldn’t be bought willy-nilly

The term ‘hard’ in hard drive shouldn’t refer to the difficulty many experience when they set out looking for a new one. It’s hard to deny the importance that hard drives still have to computers of all shapes, sizes, and operating systems — but like the elusive concept of soulmates, how do we know which one is right for us? We’ve put together a list of five things you should take into consideration prior to buying new hardware.

Google Cast becomes native to Chrome

Google Cast becomes native to Chrome

Google’s Chromecast device has been around for a few years now. The simple and inexpensive flash-drive-sized screen broadcaster has earned itself a faithful following, but it’s not stopping there. With the newest update, you might even be able to ‘cast’ your desktop or mobile screen to a nearby device before the end of this article.

These tips help enhance your Powerpoint skills

These tips help enhance your Powerpoint skills

It’s normal for us to utilize whatever tools we can to make things a little easier. Wanting to use tech to make presentations easier to understand is no exception. Although Microsoft PowerPoint can help you through the daunting task of speaking in public, that isn’t always the case.

Are your VMware machines up to date?

Are your VMware machines up to date?

Until now, virtualization hadn’t been targeted by cyber attackers with the same vigor as other small- and medium-sized business IT solutions. Whether it was because of the inherent security of virtualization or because of the relatively narrow scope of its adoption, this is no longer the case.

Ransomware appears as fake Windows Update

Ransomware appears as fake Windows Update

Unlike those who attend Hogwarts, magicians rely mainly on subtle sleight of hand to convince others that they managed to make coins disappear into thin air. The same concept applies to ransomware. How can it complete its mission in a suit labeled with the word “Villain”? Nowadays, ransomware fashions various disguises that render it undetectable.

HIPAA liability: record settlement reached

HIPAA liability: record settlement reached

Is being responsible for electronic medical records a daily source of trepidation for you or your business? While the sentiment is understandable, it often results from a lack of understanding about what HIPAA compliance actually means. As industry-wide penalties continue to rise every year, it’s essential to take a closer look at who is being fined, and why.