What are Virtual Machines? Virtualization is a process that allows for more efficient utilization of physical computer hardware by using software to create an abstraction layer of computer hardware that allows hardware elements to be divided into multiple “virtual machines” (VMs). Each VM runs its own operating system and behaves like an independent computer, even […]
Author: Nikki Pham
Server Basics
What is a server? A server is a PC that is running software that is responsible for coordinating some form of communication between nodes on a network. Servers provide shared resources on a network such as file storage, databases, email, and web services. There are four requirements for a server: computer hardware, operating system (OS), […]
Green IT
What is Green IT? Sustainable or “green” IT is a term to describe the manufacture, management, use, and disposal of information technology through methods that minimize damage to the environment. By developing green IT strategies, organizations can lower their environmental impact, reduce costs, and demonstrate their commitment to social responsibility. The Association for Progressive Communications […]
Metadata Management
What is Metadata? Metadata describes other data; it provides structured reference data that identifies attributes of the information that it describes so that the data can be identified and sorted. Metadata is created anytime a document or file is modified, including when it is deleted. Some examples of basic document file metadata include the author, […]
What are User and Entity Behavior Analytics? User and Entity Behavior Analytics (UEBA) is a cybersecurity solution that uses algorithms and machine learning to detect irregularities in the behavior of users on a network, as well as the routers, servers, and endpoints on a network. UEBA aims to recognize when user behavior on the network […]
Managed Communication
What is Managed Communication? Reliable communication is critical to business, and there are more communication services available now than ever before. Managed communication solutions are business communication systems that are managed remotely or on-site by managed service providers (MSP) or managed communication providers (MCP). Managed communication services cover a broad range of communication infrastructure including […]
What is Heuristic Analysis? The term “heuristic virus” is a nickname for a malware called Heur.Invader. Heur.Invader malware can disable antivirus software, modify security settings, and install additional malicious software onto a computer. Adware and Trojans are examples of heuristic viruses. Heuristic analysis refers to the methods employed by antivirus programs designed to detect previously […]
What Types of Cybersecurity Threats are we Facing Today? The cybersecurity threat landscape continues to feature cyberattackers exploiting vulnerabilities resulting from the global implications of the pandemic.1 Supply chain cyberattacks. Supply chain cyberattackers continue to exploit vulnerabilities in organizations that lack monitoring and use those weaknesses to perform cyberattacks such as data breaches and malware […]
What is Cyber Hygiene? As the World Health Organization explains, “Hygiene refers to conditions and practices that help to maintain health and prevent the spread of diseases. Medical hygiene therefore includes a specific set of practices associated with this preservation of health, for example environmental cleaning, sterilization of equipment, hand hygiene, water and sanitation and […]
Spyware
What is Spyware? Spyware is software that enables a user to obtain covert information about someone’s computer activities by secretly transmitting data from their device. There are many types of spyware focused on monitoring different types of information, ranging from relatively innocent web browsing trackers used by advertisers to cyberattacker enterprises seeking credentials and passwords […]