Category: Uncategorized

Backing up your data

Think about how much you rely on your business-critical data, such as customer details, quotes, orders, and payment details. Now imagine how long you would be able to operate without them. All businesses, regardless of size, should take regular backups of their important data, and make sure that these backups are recent and can be…

By PMC_Tech 05/02/2019 0

Are you a Chief Information Officer?

Whether you’re a seasoned CIO embarking on a fresh challenge or a recently promoted executive in a new role, it’s important to get your first few months as a CIO right. Achieving success at the beginning of your leadership journey is challenging, but essential. This guide will be an asset in your leadership toolkit and…

By PMC_Tech 01/02/2019 0

When out-of-date code causes chaos

A report from the US Congress has revealed that credit agency Equifax’s 2017 network breach, which affected 143 million people, was not spotted because of an expired software certificate. In December 2018, mobile operator O2 blamed a similar issue for causing a network blackout which affected the UK. But what is a digital certificate and…

By PMC_Tech 01/01/2019 0

Four Business Continuity Planning Essentials

Introduction Data is essential for all types of organisations today, so ensuring access to mission critical applications and data following a disaster is critical. However, business continuity and disaster preparedness are about so much more than that. In other words, you might have important apps up and running somewhere, but that doesn’t matter if your…

By PMC_Tech 25/10/2018 0

Timeline of computer security hacker history

The timeline of computer security hacker history covers important and noteworthy events in the history of security hacking and cracking. 1900s 1903 : Magician and inventor Nevil Maskelyne disrupts John Ambrose Fleming’s public demonstration of Guglielmo Marconi’s purportedly secure wireless telegraphy technology, sending insulting Morse code messages through the auditorium’s projector. 1930s 1932 : Polish…

By PMC_Tech 06/08/2018 0

Internet data and history…

It’s mine – you can’t have it. If you want to use it for something, then you have to negotiate with me. I have to agree, I have to understand what I’m getting in return. I myself feel that it is very important that my ISP supplies internet to my house like the water company…

By PMC_Tech 30/07/2018 0

The Greatest Computer Hacks

Vandalism, Theft, and Cleverness on a Large Scale Hacking is about manipulating and bypassing systems to force them to do the unintended. While most hackers are benign hobbyists, some hackers inflict terrible widespread damage and cause financial and emotional injury. Victimized companies lose millions in repair and restitution costs; victimized individuals can lose their jobs,…

By PMC_Tech 20/06/2018 0