<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">

OUR BLOG

The Importance of Data Privacy

Posted by Keith Shaffer Feb 21, 2020 3:20:06 PM

Data privacy is one of the most overlooked aspects for both individuals and businesses today. With most of the internet’s  infrastructure (search, email, etc.) provided by tech giants, most people assume they don’t have to worry about their privacy and their data isn’t being utilized for other services.

Read More

Topics: Cyber Security, Data Protection, Data Privacy

Safe Cybersecurity Practices When Doing Money Transfers

Posted by Keith Shaffer Jan 6, 2020 11:38:33 AM

 

Read More

Topics: Cyber Security, Money Transfer

IoT and Cybersecurity: Trends, Security and Outlook

Posted by Keith Shaffer Jan 1, 2020 11:51:25 AM

Over 200 billion devices are estimated to be connected to the internet by 2020 worldwide. This includes an array of new devices hitting global markets in addition to the existing pool of devices. This number may seem staggering because it would mean that each human would need almost 25 devices for the math to add up. If you account for the phones, watches, computers, cars, TVs, etc. this number is relatively small and continues to increase over time. This is because almost all devices and physical products will have some sort of internet connection to perform tasks better. For example, a smart refrigerator can tell the temperature of the food in the fridge while informing about weather conditions and saving grocery lists.

Read More

Topics: Cyber Security, Internet of Things (IoT)

Cybersecurity and WiFi: Risks, Cyberattacks and Safe Practices

Posted by Keith Shaffer Dec 17, 2019 6:00:26 AM

Over 25% of WiFi networks in the world have virtually no encryption or password protection. This is extremely troublesome because any information transmitted through those WiFi networks can be seen by third parties. Third parties with ill intentions can use this data to steal passwords and commit identity theft to unassuming users. The damage that can be done to businesses is exponentially worse than individual consumers. If an employee of a business conducts work over unsecured WiFi networks, it leaves the business susceptible to infiltration by an external threat. It’s important to educate and implement safe cybersecurity protocols for your business to ensure third parties do not gain access into your business.

Read More

Topics: Cyber Security, Hacked, WiFi

Case Study: Bringing A Law Firm Into Cloud Computing

Posted by Keith Shaffer Dec 5, 2019 3:29:46 PM

Fairdinkum was challenged with helping a law firm client transition from their old IT infrastructure to modern cloud computing. In addition to helping set up the client’s cloud presence, Fairdinkum had to manage all the client’s devices. The client also needed to migrate their email system and files to the cloud. During this project, Fairdinkum was able to help the client fully onboard onto cloud computing and exploit the cloud’s bandwidth by facilitating collaboration and establish the client’s data infrastructure.

Read More

Topics: Cloud Computing, Case Study