Protect Yourself Against Cybercrime

| October 18, 2016

article image
Maybe I’ll start doing an ‘Infographic Friday’ to go along with Lori’s F5 Friday.  This one comes to us from  Rasmussen College's School of Technology and Design Cyber Security Program and shows the online risks and offers some good tips on how to better protect your computer and avoid being a victim of cybercrime.

Spotlight

Altran

As a global leader in Engineering and R&D services, Altran offers its clients a new way to innovate by developing the products and services of tomorrow.

OTHER ARTICLES

FUTURE-PROOFING 5G ARCHITECTURE WITH OPEN-RAN

Article | May 19, 2021

The RAN (Radio Access Network) architecture for mobile networks includes a remote radio unit (RRU) located at the top of a cell tower, which communicates with a baseband unit (BBU) at the base of the tower. The hardware and communication interfaces are owned by a specific vendor, and its software-driven functionality is tightly coupled within the hardware. Traditionally, this has worked well for mobile network operators (MNOs). However, there are several drawbacks to consider – for instance, upgrading or changing the wireless network demands physical hardware replacements throughout the network, which is cost-inefficient, labor-intensive, and time-consuming. Furthermore, the equipment and interfaces that connect the hardware are owned by the vendors that originally supplied them, which locks MNOs into existing relationships with them.

Read More

How 5G Mobile Networks Will Change IoT Security

Article | February 26, 2020

This technology claims to provide more efficient interconnectivity, and faster data transfers between people, objects and devices. All good things, right? But what security risks does 5G represent for the modern age? Some cybersecurity experts suggest that new vulnerabilities are versions of problems not entirely flushed out from 4G and even 3G networks. This article will attempt to explore some problems and opportunities that IoT security experts need to be aware of, and how savvy enterprises can be proactive about security in the age of 5G.

Read More

Recognizing Virtual Meeting Fatigue and What You Can Do About It

Article | May 20, 2021

I’m a new-ish remote worker and, although I love 99% of everything associated with it, lately, after every virtual meeting I have, I’m feeling exhausted and drained. And not in the normal, everyday work exhausted and drained kind of way. It’s a peculiar combination of eye strain, headaches, and general malaise that I really only experience after a long day of virtual meetings. I was curious if others were feeling the same so I did a completely non-scientific study of my remote work friends to see how they’ve been feeling. Turns out, I’m not alone. Workers everywhere are going through a huge transition as the work from anywhere model has accelerated at breakneck speed since the pandemic. Although some parts of the world are slowly returning to a new normal, many employers, including Tangoe, have made the decision to keep the work from anywhere model while some organizations are electing to use a hybrid model of partly remote, partly in-office.

Read More

How the coronavirus is changing internet usage patterns worldwide

Article | March 22, 2020

As more home-bound people self-isolate in an attempt to slow the spread of COVID-19, the coronavirus, they are changing internet traffic patterns and consumption in a major way. According to Cloudfare, a provider of internet optimization, security, and availability services to 10% of the world's websites, demand for video conferencing, streaming services like Netflix, news, and online shopping coming from residential broadband networks is surging. Traffic originating from businesses and universities is slowing.

Read More

Spotlight

Altran

As a global leader in Engineering and R&D services, Altran offers its clients a new way to innovate by developing the products and services of tomorrow.

Events