<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">


Keith Shaffer

Recent Posts By Keith Shaffer

Safe Cybersecurity Practices When Doing Money Transfers

Posted by Keith Shaffer Jan 6, 2020 11:38:33 AM


Read More

Topics: Cyber Security, Money Transfer

IoT and Cybersecurity: Trends, Security and Outlook

Posted by Keith Shaffer Jan 1, 2020 11:51:25 AM

Over 200 billion devices are estimated to be connected to the internet by 2020 worldwide. This includes an array of new devices hitting global markets in addition to the existing pool of devices. This number may seem staggering because it would mean that each human would need almost 25 devices for the math to add up. If you account for the phones, watches, computers, cars, TVs, etc. this number is relatively small and continues to increase over time. This is because almost all devices and physical products will have some sort of internet connection to perform tasks better. For example, a smart refrigerator can tell the temperature of the food in the fridge while informing about weather conditions and saving grocery lists.

Read More

Topics: Cyber Security, Internet of Things (IoT)

Cybersecurity and WiFi: Risks, Cyberattacks and Safe Practices

Posted by Keith Shaffer Dec 17, 2019 6:00:26 AM

Over 25% of WiFi networks in the world have virtually no encryption or password protection. This is extremely troublesome because any information transmitted through those WiFi networks can be seen by third parties. Third parties with ill intentions can use this data to steal passwords and commit identity theft to unassuming users. The damage that can be done to businesses is exponentially worse than individual consumers. If an employee of a business conducts work over unsecured WiFi networks, it leaves the business susceptible to infiltration by an external threat. It’s important to educate and implement safe cybersecurity protocols for your business to ensure third parties do not gain access into your business.

Read More

Topics: Cyber Security, Hacked, WiFi

Case Study: Bringing A Law Firm Into Cloud Computing

Posted by Keith Shaffer Dec 5, 2019 3:29:46 PM

Fairdinkum was challenged with helping a law firm client transition from their old IT infrastructure to modern cloud computing. In addition to helping set up the client’s cloud presence, Fairdinkum had to manage all the client’s devices. The client also needed to migrate their email system and files to the cloud. During this project, Fairdinkum was able to help the client fully onboard onto cloud computing and exploit the cloud’s bandwidth by facilitating collaboration and establish the client’s data infrastructure.

Read More

Topics: Cloud Computing, Case Study

Case Study: Disaster Recovery Plan Implemented During Superstorm Sandy

Posted by Keith Shaffer Dec 5, 2019 3:25:02 PM

Hurricane Sandy caused the most damage of any hurricane since Hurricane Katrina in 2005. The damages totaled over $62 billion and many businesses suffered greatly due to the tragedy. One specific victim was a nonprofit client of Fairdinkum; the client had no power, no disaster recovery plans and their offsite mozy backups were failing. With almost their entire physical and virtual infrastructure in ruins, the client needed immediate help to save their data and business as a whole.

Read More

Topics: Non Profit, Case Study, Disaster Recovery