Securing SCADA Systems from Hacking

Supervisory Control and Data Acquisition (SCADA) is a technology used to control sewage, drainage, and water systems. These systems are vital to ensure the delivery and monitoring of reservoirs drainage of wastewater and sewage. As well, these SCADA systems are used to monitor and control nuclear power plants, the electrical grid, HVAC systems, and more. …

How Secure Is Wi-Fi For Your Business?

Wi-Fi has been around for a long time, in fact, it was first introduced to consumers on September 21, 1997, and has been continually evolving resulting in faster speeds, further coverage and increased reliability. Wi-Fi uses radio waves to transmit data from your wireless router to your Wi-Fi enabled devices like your TV, smartphone, tablet, …

Two-Factor Authentication Strengthens Security

Two-Factor Authentication (2FA) is a security feature that adds an additional layer of protection from cybercriminals. As the name suggests, 2FA requires an extra step, “a second factor” to log onto a site or access an online account. The first part of 2FA is your password, and the second part of 2FA is usually a …

IT Disaster Recovery Planning: Expect the best but prepare for the worst.

Disaster can strike any business without warning such as natural disasters, hardware failure, power outages, software issues, user errors, data breaches or cyberattacks. In this day and technical age it is very important to evaluate your IT infrastructure and understand what data security measures should be implemented to facilitate damage control and quickly restore operations. …