Blog
Latest Technology News from SemTech
Could You Spot a Social Engineering Attack?
As invaluable as the security solutions that protect a network are, they can be effectively rendered useless if a cybercriminal is skilled in social engineering. Social engineering is the practice of using manipulation to access protected resources, as we will…
Read More4-skills-needed-for-it-project-management-success
When so much of what we write is about the threats and attacks that exist (and are carried out) in cyberspace, it is particularly refreshing when we can discuss those responsible for these attacks in the context of their legal…
Read MoreCybersecurity Can’t Stop During the Holidays
This Christmas, technology is everywhere. Traditionally, the holidays were a time when things slowed down for businesses and people spent time with their families and put their work on the back burner. Those days are over. Today’s professional is lucky…
Read MoreMajor Cyber Threats Are Less Of A Worry With An MSP’s Help
There are dozens of surveys and reports produced each year that evaluate digital threats and cybercrime. Not every publication applies to every business – but many of them do have some important take aways about the best practices of handling…
Read MoreThe Federal Bureau of Investigation Has Some Valuable Cybersecurity Tips
In February of 2016, President Barack Obama passed a Cybersecurity National Action Plan. The plan implemented near-term actions and developed a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, and maintain public safety. Taking action against cybersecurity now…
Read MoreHackers Beware: IBM Unleashes Supercomputer Watson to Tackle Cybercrime
Sherlock Holmes is one of the most famous detectives in fiction, but without his dear Dr. Watson, he would have been stumped on occasion. There’s a good reason why IBM named its super-intelligent computer, Watson, after the famous character. True…
Read MoreHow and Why Cyber Crime is so Effective
The Internet is a fantastic tool that has ushered in an era of productivity and connectivity that we could only previously have dreamed of. Unfortunately, like every great tool, it can be used for darker, malicious purposes. In the Internet’s…
Read More