Brain Trust Technologies LLC
TOLL FREE: (877) 288-5527
  • Home
  • Why Brain Trust
    • Partners & Certifications
    • Affiliations
  • Services & Solutions
    • Managed Services
    • Hosted Solutions
      • Business Solutions
    • Hardware & Software Sales
    • Professional Services
    • Business Continuity
  • Blog
  • Resources
    • White Papers
    • Brain Trust Reports
    • Case Studies
    • Newsletter Archive
  • About Us
    • Referral Program
    • Contact Us
  • Support

9 cybersecurity terms everyone must know

September 21, 2016 admin Security 0 Comments 2016september21_security_c, cyber attackers, malware, patch, phishing, ransomware, security, zero day attack

2016September21_Security_C_PH.jpg

2016september21_security_cEveryone, from doctors to lawyers, needs to continue learning to stay ahead of the times. Business owners might have it worst of all, oftentimes needing to stay on top of several industries to keep their company running. Keep reading for a refresher on all the latest trends and buzzwords used in the cybersecurity sector.

Malware

For a long time, the phrase ‘computer virus’ was misappropriated as a term to define every type of attack that intended to harm or hurt your computers and networks. A virus is actually a specific type of attack, or malware. Whereas a virus is designed to replicate itself, any software created for the purpose of destroying or unfairly accessing networks and data should be referred to as a type of malware.

Ransomware

Don’t let all the other words ending in ‘ware’ confuse you; they are all just subcategories of malware. Currently, one of the most popular of these is ‘ransomware,’ which encrypts valuable data until a ransom is paid for its return.

Intrusion Protection System

There are several ways to safeguard your network from malware, but intrusion protection systems (IPSs) are quickly becoming one of the non-negotiables. IPSs sit inside of your company’s firewall and look for suspicious and malicious activity that can be halted before it can deploy an exploit or take advantage of a known vulnerability.

Social Engineering

Not all types of malware rely solely on fancy computer programming. While the exact statistics are quite difficult to pin down, experts agree that the majority of attacks require some form of what is called ‘social engineering’ to be successful. Social engineering is the act of tricking people, rather than computers, into revealing sensitive or guarded information. Complicated software is totally unnecessary if you can just convince potential victims that you’re a security professional who needs their password to secure their account.

Phishing

Despite often relying on face-to-face interactions, social engineering does occasionally employ more technical methods. Phishing is the act of creating an application or website that impersonates a trustworthy, and often well-known business in an attempt to elicit confidential information. Just because you received an email that says it’s from the IRS doesn’t mean it should be taken at face value — always verify the source of any service requesting your sensitive data.

Anti-virus

Anti-virus software is often misunderstood as a way to comprehensively secure your computers and workstations. These applications are just one piece of the cybersecurity puzzle and can only scan the drives on which they are installed for signs of well known malware variants.

Zero-day attacks

Malware is most dangerous when it has been released but not yet discovered by cybersecurity experts. When a vulnerability is found within a piece of software, vendors will release an update to amend the gap in security. However, if cyber attackers release a piece of malware that has never been seen before, and if that malware exploits one of these holes before the vulnerability is addressed, it is called a zero-day attack.

Patch

When software developers discover a security vulnerability in their programming, they usually release a small file to update and ‘patch’ this gap. Patches are essential to keeping your network secure from the vultures lurking on the internet. By checking for and installing patches as often as possible, you keep your software protected from the latest advances in malware.

Redundant data

When anti-virus software, patches, and intrusion detection fail to keep your information secure, there’s only one thing that will: quarantined off-site storage. Duplicating your data offline and storing it somewhere other than your business’s workspace ensures that if there is a malware infection, you’re equipped with backups.

We aren’t just creating a glossary of cyber security terms; every day, we’re writing a new chapter to the history of this ever-evolving industry. And no matter what you might think, we are available to impart that knowledge on anyone who comes knocking. Get in touch with us today and find out for yourself.

Published with permission from TechAdvisory.org. Source.

Four considerations before buying hardware

September 20, 2016 admin Hardware 0 Comments 2016september20_hardware_c, computer, devices, drive, hard, hardware, new, purchase, smb, system, tips

2016September20_Hardware_C_PH.jpg

2016september20_hardware_cUnlike getting a new pair of sweatpants, the process of buying new hardware isn’t as straightforward. Because there are so many choices out there, it’s hard to go with what your friend has to say or which ones are selling at 50% off. If you want hardware that doesn’t only fit but also compliments your computer, go through these five things every buyer should consider if new hardware is on the top of your shopping list.

Hard Disk Drive VS. Solid State Drive

Firstly, you have to know which type of data storage you plan to use: Hard Disk Drive (HDD) or Solid State Drive (SSD).Capabilities of HDDs are on par with SSDs — but that doesn’t mean there aren’t any pros and cons. An SSD is a type of drive that uses flash memory for storing data, as opposed to spinning metal disks found in the traditional HDD — think of it like an extra large USB thumb drive.

On the upside, SSDs are faster at reading and writing data. They require less energy, are silent, and generally have longer lifespans. Downsides include small data capacities and a heftier price tag. It all boils down to what you’re going to your needs. Go for HDDs if you have budget restrictions or are looking for a backup/external drive; go for SSDs if the drive will run frequently-accessed files and programs.

Physical size and interface

After deciding between an HDD or SSD, you now have to choose a form factor. Luckily there are only two choices: the 3.5-inch drive and the 2.5-inch drive. The right one will likely depend on your current setup. With traditional HDDS, data is stored on spinning metal disks, meaning that more disks will be needed to expand data capacity. Because of this, desktop HDDs tend to be 3.5 inches with a maximum capacity of 4 TB, whereas laptops are 2.5 inches with a maximum capacity of 2 TB. SSDs are made smaller since they don’t require any removable parts, meaning they’ll fit easily into the 2.5-inch form factor. Adapters are available if you need to use the SSD in a 3.5-inch connector.

Specifications and performance

Now that you know what kind of drive to buy, it’s time to narrow down the candidates and find the best one that suits your needs. Here are some factors you need to consider:

  • Storage capacity – HDDs come in various sizes, but due to physical limitations, they cap off at 4 TB. Whereas SSDs are much smaller and doesn’t exceed the 1 TB mark – some consumer-level SSDs rarely exceed 512GB.
  • Transfer speed – Performance of consumer-level HDDs are determined by multiple factors, and revolutions per minute (RPM) is an important one. Higher RPM means faster data transfer between drives.
  • Cache space – If a hard disk needs to transfer data from one section to another, a special area of embedded memory known as the cache is utilized. Larger cache enables data to be transferred faster (because more information can be stored at one time). Modern HDDs have cache sizes ranging from 8-12 MB.
  • Access times – HDDs have a couple of factors that impact their performance. One is the time it takes for the reader to start reading or writing data from the drive. For SSDs, you want to look for sequential read and write speeds (also known as sustained reading and writing speeds). Just as long as the speeds are within the SATA connector’s max speed, you’ll be fine.
  • Failure rate – Though all things mechanical gradually wear and tear over time, not all HDDs are the same. Some models last six months where others make it past six years. You must do adequate research on a per-model basis before making a purchase.

External VS. Internal

The final step is to decide whether you want the hard drive to reside within of if it will get its own compartment outside. External drives are ideal for storage and backup purposes; they generally connect with a USB 2.0 that caps out at 480Mb/s — newer models that support USB 3.0 boasts a max of 5.0Gb/s. Unless the model you get is USB 3.0 compatible, the speed will likely be insufficient when it comes to running an operating system.

Speed issues aside, they’re portable and can be shared with multiple computers. They can even be plugged into TVs and media centers for direct playback. If portability falls second to speed, or if your current system lacks a working data drive, internal is the best choice.

Now that you’re armed with the necessary information, buying your next hardware should be a pleasant experience, like a walk in the park. If you have further questions or would like to know more, feel free to contact us by phone or email; we’re more than happy to help.

Published with permission from TechAdvisory.org. Source.

Enhance networking with LinkedIn Alumni

September 15, 2016 admin Social Media 0 Comments 2016september15_socialmedia_c, advancement, alumni, career, efficiency, job, linkedin, network, networking, opportunity, out, reaching, tool

2016September15_Socialmedia_C_PH.jpg

2016september15_socialmedia_cCatching up with your friends at your high school reunion is all well and fun before the conversation turns to work. It seems like all your friends have well-paying jobs, and you’re stuck with a demanding one that’s underpaid. What if there were a way you could land better jobs or further your career path? No sacrificial ceremonies needed. Instead, find out how LinkedIn’s Alumni Tool taps into your network and brings you one step closer to success.

Get started

Access the Alumni tool by going to the homepage and hovering over “My Network.” Then select “Find Alumni.” From there, you are free to perform any search for individuals who have attended your school. You can apply one or more of the following filters:

  • Where they live (geographic location)
  • Where they work (company)
  • What they do (job function)
  • What they studied (major)
  • What they’re skilled at (LinkedIn skills)
  • How you are connected (first- and second-degree connections, group members, etc.)

On top of that, you can also identify alumni by the year they attended school, or you can conduct a text search for specifics that don’t fit in any of the listed filters.

The benefits of LinkedIn Alumni

Imagine that you’re looking for work in a new city. Let’s say you’re looking for a marketing job in Texas. With the Alumni tool, select “Dallas/Fort Worth” area under “Where they live” and “Marketing” under “What they do.” If you are interested in a specific area of marketing like social media, you can refine your search by selecting “Social Media Marketing” for the “What they’re skilled at” filter. The more you target your search, the more relevant your results will be. From there, you can sift through profiles and send messages to those you want to have an actual conversation with. You can dip your toes into the water first by setting up an informational interview or exchanging questions via email.

If you’re looking to change careers but don’t know anyone in your new sector, all you need is filter for your alma mater. It shouldn’t be hard to reach out to anyone who went to the same school as you, because going to that school is what you both share in common. If you want to know how others made the leap toward where you’re headed, you can use the “What they studied” and “What they’re skilled at” filters for further information. You might also be able to find an individual with a nontraditional background, but who’s nonetheless working in the industry you want. This person may have insight into how to land the job without possessing the typical required experience.

Know how to contact the candidates

After narrowing down your search by utilizing the appropriate filters, you now have a list of individuals you wish to connect with. Technically, you’re just about done with the “Alumni Tool” portion of the process, but you’re not at the finish line just yet. All that’s left is to reach out to the people in your list and make the most out of the search.

If you have a first-degree connection with certain people, message them by clicking on the envelope icon found below the job title. Without a first-degree connection, you’ll see a silhouette and plus sign below the job title. From there, look to the bottom right of the profile photo; if there’s a Venn diagram, hover over it to see the connections you share. If you have a good relationship with one of these mutual connections, you should consider reaching out to see whether he or she would be willing to make an introduction.

There are a few ways to connect even without mutual connections. One option is to leverage your school’s alumni database to find contact information. Another is to send a personalized connection request. In the message, politely and briefly explain your reasons for wanting to connect. That should do it!

When used properly, networks truly are the keys to success. Like any other untapped resource, you must proceed with caution and know how to fully utilize it. If you have questions or concerns regarding LinkedIn’s Alumni tool, don’t hesitate to call in or send us an email. Let us be a part of the success that awaits you.

Published with permission from TechAdvisory.org. Source.

«‹ 44 45 46 47›»
Brain Trust Technologies LLC

6749 S. Westnedge Ave
Suite K, #128
Portage, MI 49002-3556

Southwest Michigan: (269) 290-7137
St. Louis: (314) 558-0623
Toll Free: (877) 288-5527

SMS Terms of Service | SMS Privacy Policy

© 2025 Brain Trust Technologies, LLC. All Rights Reserved