About two years ago, in the summer of 2015, a friend of mine suggested that I read a book called “The Art of Electronics” by Horowitz, who has since passed away.
To me this sounds like a very boring topic and I was about to bounce it off my friend until he said “I’m not kidding, give it a chance it’s amazing.”
After reading it I was astounded. It is truly one of the best books I have ever read.
The only way you can know more about electronics and security is to learn more about both.
Immediately after finishing the book, I began writing my own blog on the same subject: How To Secure Your Business’s Data: A blog about how to secure data from cyber threats.
We all know that it is important to protect your data. But how do you do that? In this blog we will discuss how we were able to secure our business’s data from cyber threats like malware, ransomware, hacks, and phishing attacks.
We hope you find this blog useful and informative. Please don’t hesitate to contact us if you have any questions or concerns about protecting your company’s data.
We’ve all heard stories about thieves stealing credit card numbers. But what about the cases where cyber criminals move from a credit card number to a bank account number?
The crooks don’t need to steal your credit card number, because they can just change the last four digits of your bank account number with a simple phone call. This is the “chain link” problem, and it’s a big problem for small businesses.
And it’s not just for small businesses. If you work for a large corporation that handles corporate payments, chances are you’re also dealing with this problem.
The future is about computers and networks. If you can’t secure your computer or network, you’re dead.
Cyber-security is an important part of any business’s defense structure. At the same time, it’s a dull subject to write about. Cyber-attacks seem like a scary mystery that might be solved later.
E-mail is a public medium. Anyone can read it, even if the sender and recipient are anonymous. The same goes for Google and Facebook and Twitter, which all store your messages in publicly accessible databases.
The problem is that people want to communicate with you and give you information. They don’t just want your money, they want to tell you about the latest product, or share the great idea they had with you last night, or ask for your help with their research project. They all want to be heard by you. But your business needs to be able to respond quickly and reliably. And you need to be able to keep the information private from everyone else.
To solve this problem, we came up with a lattice of encryption mechanisms—and then we built a product that made it easy for companies to use them.
When criminals get into a company’s computer systems, they try to steal whatever they can. When they fail, they often leave behind detailed notes describing what they did and why it worked. That makes it easy for other hackers to replicate the attack, which is exactly what happened at Sony in 2014.
It’s not just criminals taking advantage of security gaps – it’s the companies themselves. In 2015 the US government warned that “hundreds of high-level” Chinese government officials had stolen personal data on millions of Americans from US companies like Anthem, Anthem Blue Cross and JP Morgan Chase.