by Peter Casserly | May 9, 2018 | Blog
Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are...
by Peter Casserly | May 7, 2018 | Blog
Information technology, in many ways, is a necessary evil. Sure, modern businesses more or less require it to remain competitive, but it also opens up your business to a multitude of threats. Maintaining your security is made much easier with automated monitoring...
by Peter Casserly | May 4, 2018 | Blog
Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation...
by Peter Casserly | May 4, 2018 | Blog
The Star Wars saga has many recurring themes – the struggle between desire and destiny, good and evil, impulse and discipline. However, a theme that particularly stands out throughout the series is the examination of the relationship between student and teacher....
by Peter Casserly | May 2, 2018 | Blog
It is no secret that Google can serve a great utility in the office through its many services and applications. However, have you ever considered how the Google Assistant can, well, assist you through devices like your smartphone and the assorted smart speakers that...
by Peter Casserly | Apr 30, 2018 | Blog
Smart technology has seen explosive growth in recent years, leading to an uptick in startups popping up to capitalize on smart tech and the innovative ways it can be leveraged. With demand for such devices increasing exponentially, it’s little wonder that many...