Brain Trust Technologies LLC
TOLL FREE: (877) 288-5527
  • Home
  • Why Brain Trust
    • Partners & Certifications
    • Affiliations
  • Services & Solutions
    • Managed Services
    • Hosted Solutions
      • Business Solutions
    • Hardware & Software Sales
    • Professional Services
    • Business Continuity
  • Blog
  • Resources
    • White Papers
    • Brain Trust Reports
    • Case Studies
    • Newsletter Archive
  • About Us
    • Referral Program
    • Contact Us
  • Support

Confusing tech terms simplified

March 4, 2016 admin Hardware 0 Comments 2015mar2_hardware_c, app, browser, CPU, geek speak, hard drive, jargon, motherboard, processor, ram, search engine

2015Mar2_Hardware_CTrying to fix your broken IT can be challenging. You may struggle to clearly define your problem, which can lead to frustration for both you and your IT repairman. So we’ve created a list of some common tech terms to help you communicate more easily with the technology geeks of the world. Here are a few to get you started.

App – These days when someone hears the word “app”, they usually think of a program for their tablet or smartphone; however, the word “app” actually has a much more broader meaning. Apps, which is short for applications, have been around since the birth of computers, and the word really refers to any type of computer program. Some examples of common apps used today include Microsoft Word, Adobe Photoshop, and Symantec Antivirus.

Browser – Your window to the Internet, a browser enables you to access all the information there is online. In fact, the Internet is virtually inaccessible without the use of a browser, and you’re likely reading this article on a browser right now. Google Chrome, FireFox, and Microsoft Edge are a few examples of common browsers.

Search Engine – Not to be confused with a browser, a Search Engine is a page you visit within your browser that allows you to search and find what you’re looking for on the web. You type keywords or phrases into a Search Engine, press enter, and then the web pages and files that contain those phrases and keywords are presented to you. Google, Bing and Yahoo! are a few of the Search Engines available.

Hard drive – A hard drive is essentially a storage unit for everything on your computer. Everything from your operating system to applications, such as Excel and PowerPoint, are stored on your hard drive, and it allows your computer to access these files and programs for your use. The more hard drive space you have, the more applications, videos, documents and various files can be stored on your computer.

Motherboard – If your computer had a heart, the motherboard would be it. The motherboard is a circuit board that powers your RAM, CPU and hardware, enabling it all to communicate with each other. If the motherboard is taken out of the equation, your computer will be unable to operate.

CPU/Processor – If the motherboard is the heart of the computer, then the CPU, or Central Processing Unit, is the brains. A CPU carries out the instructions it receives from the different hardware and software operating on the computer. At one point or another, everything on your computer goes through the CPU. And the more powerful it is, the faster it will be able to operate and the more advanced applications you’ll be able to run.

RAM – Random Access Memory stores all the temporary programs and data that your computer is currently using so they can quickly be accessed by your computer’s CPU. For example, if you are running Microsoft Word, Google Chrome, Adobe Reader, and Skype all at the same time, RAM enables you to access them fast – without having to reopen them every time. The more RAM you have the quicker these programs will run. Once your computer shuts down, it will no longer store these programs in the RAM, but instead in the hard drive.

These are just a handful of terms a layperson may come across when asking for technology service or talking about computers. If you’d like to learn more about the tech talk that is native to us IT professionals, or have any concerns with your current IT, don’t hesitate to get in touch.

Published with permission from TechAdvisory.org. Source.

Risks financial firms face

February 29, 2016 admin Security 0 Comments 2015feb29_security_c, account, attack, bank, crime, customer, cyber, financial, industry, money, safety, sector, security, target, threat

2015Feb29_Security_CTTP’s stands for threats and tactics, techniques and procedures, the number of which has been gradually increasing since 2015. The financial services sector has long been the target for cyber criminals, where they apply a myriad of techniques ranging from social-engineering to credential-stealing malware. This means the time for security professionals to boost cyber situational awareness has never been more fitting. These are the seven latest threats that have recently surfaced:

Extortion

The cyber criminal Armada Collective gained notoriety for being the first to utilize distributed denial-of-service (DDoS) attacks. This occurs when multiple systems flood a targeted system to temporarily or completely disrupt service. They evolved the idea further and started to extort Bitcoins from victims who were initially notified of their vulnerability. If they didn’t comply with the ransom demands of the criminals, they would flood their systems until the victim’s network would shut down completely.

Social media attacks

This involved criminals using fake profiles to gather information for social engineering purposes. Fortunately, both Facebook and Twitter began to proactively monitoring for suspicious activity and started notifying users if they had been targeted by the end of 2015. However, you should still have your guard up when someone you don’t know, or even a friend or colleague, starts asking you suspicious questions.

Spear phishing

Phishers thrive off familiarity. They send out emails that seem to come from a business or someone that you know asking for credit card/bank account numbers. In 2015, phishers went to the next level and began whaling. This normally involved spoofing executives’ emails (often CEO’s) to dupe the finance departments to transfer large sums of money to fraudulent accounts.

Point-of-sale malware

POS malware is written to steal customer payment (especially credit card) data from retail checkout systems. They are a type of memory scraper that operates by instantly detecting unencrypted type 2 credit card data and is then sent to the attacker’s computer to be sold on underground sites.

ATM malware

GreenDispenser is an ATM-specific malware that infects ATM’s and allows criminals to extract large sums of money while avoiding detection. Recently reverse ATM attacks have also emerged, this is when compromised POS terminals and money mules to reverse transactions after money being withdrawn or sent to another bank account.

Credential theft

Dridex, a well known credential-stealing software, is a multifunctional malware package that leverages obfuscated macros in Microsoft Office and extensible markup language files to infect systems. The goal is to infect computers, steal credentials, and obtain money from victims’ bank accounts. It operates primarily as a banking Trojan where it is generally distributed through phishing email messages.

Other sophisticated threats

Various TTP’s can be combined to extracted data on a bigger scale. Targeting multiple geographies and sectors at once, this method normally involves an organized crime syndicate or someone with a highly sophisticated setup. For example, the group Carbanak primarily targeted financial institutions by infiltrating internal networks and installing software that would drain ATM’s of cash.

The creation of defensive measures requires extensive knowledge of the lurking threats and our team of experts is up-to-date on the latest security information. If you have any questions, feel free to contact us to find out more about TTP’s and other weapons in the hacker’s toolbox.

Published with permission from TechAdvisory.org. Source.

4 steps to enhance your online image

February 17, 2016 admin Social Media 0 Comments 2016feb17_internetsocialnetworkingandreputationmanagement_c, business, creation, executives, image, management, media, online, reputation

2016Feb18_MicrosoftWindowsNewsAndTips_CThe term ‘image’ is no longer associated with just pictures or paintings. In this modern day and age, image extends to how one perceives your business in reality and online. You can’t simply hit F5 and refresh an image you aren’t comfortable with. Find out how you can constantly maintain and improve your online image with the following tips.

Own the first page of search results

In his new book on online reputation management, Tyler Collins, a digital marketing expert for Fortune 500 companies mentions the importance of a company’s search results that appear after pressing enter. These results make up the majority of a business or personal reputation online. For optimal results, it is advised that you occupy the first 10 spots (the entire first page of the search results), and within this number, there should also be a variety of related content such as positive reviews, media coverage as well as customer testimonials that contribute to the establishment of trust and credibility.

Paint the picture before the exhibition

Especially for entrepreneurs embarking on a new company, it is best to work on their online reputation before launching. This includes creating a brand, company name and message, all of which should help your business land the top 10 search results online. You should invest some time in thoroughly researching potential brand names to ensure your tentative company name has no negative associations.

Don’t forget the execs

Equally important to online brand management is the implementation of reputation management policies for key executives. While researching a company, potential customers don’t only take statistics and reviews into consideration but also the people that are involved with and leading the organization. This is why it’s absolutely essential that your key executives have a clean online reputation.

To achieve this, the company can create a dedicated bio for each executive that helps increase the search ranks of that particular executive’s name. The next step is to get (positive) media coverage whenever possible. Everything from blog posts to press releases and quotes in an online news story will help forge a strong and credible image for the individual, and in extension, for the company.

Ask for help when required

When times get tough, seek the expertise of specialists that help maintain and improve online images for a living. It is almost impossible to change a customer’s first impression of executives and the company, so investing in expert advice can turn out to be the most important step in creating and maintaining your virtual image.

We hope you find these four online reputation tips helpful. If you need more help creating a credible online image or are looking to utilize technology to establish a stronger online image, give us a call. Expert advice awaits.

Published with permission from TechAdvisory.org. Source.

«‹ 60 61 62 63›»
Brain Trust Technologies LLC

6749 S. Westnedge Ave
Suite K, #128
Portage, MI 49002-3556

Southwest Michigan: (269) 290-7137
St. Louis: (314) 558-0623
Toll Free: (877) 288-5527

SMS Terms of Service | SMS Privacy Policy

© 2025 Brain Trust Technologies, LLC. All Rights Reserved