Thom Heemstra's blog

You are here: Home / Archives for Responding to news

Recent Developments in Blockchain

27th February 2020 by thom Leave a Comment

Blockchain is a list of records that are growing and which are connected or linked using a technology called cryptography. It is basically a design of an open ledger which is used to record the transactions between two parties in an efficient and permanent manner. The technology of blockchain has evolved over these years but it has maintained its position in the market as it still offers much more than the other technologies available in the market (Abrams & Agarwal, 2016). Following are some of the recent developments of blockchain that will leave you amazed. [Read more…]

Filed Under: BlockChain, Money, Responding to news, Security Tagged With: baas, security, smart contracts

Internet Privacy Issues And Ways It Can Be Compromised

13th September 2019 by thom Leave a Comment

It has become nearly impossible for everyone to live an anonymous life on the internet. No one can imagine how much they are vulnerable and to what extent their personal information is available on the internet (Chaum, 2016). Everyone has to face privacy issues as the marketers keep on gathering information about individuals in order to run their business and cater to new customers. [Read more…]

Filed Under: Big Data, Privacy, Responding to news, Security

5 Interesting Developments In The Iot World

2nd August 2019 by thom Leave a Comment

The internet of things is a system of interrelated computing devices, people, objects, mechanical devices that provide two benefits. The first one is that it requires unique identifiers (UIDs) and the second one is that it helps to transfer the data over a network without any interference of anyone. The technology is emerging immensely that it has IoT to put forward its contributions as well by making amazing developments that are as follows (Fan & Chen, 2017): [Read more…]

Filed Under: Big Data, Internet of Things, Privacy, Responding to news, Security

What can domain owners do to protect private information?

1st February 2019 by thom Leave a Comment

It is becoming more evident that privacy in this digital age requires more than just maintainence.

The digital age has made it easier than ever to connect with our friends and family. Opening an account on a social media site only takes a few minutes. Once they fill up the site’s registration form, they are good to go.  (Martineau, M. 2016)

However, by filling the form, they also agree to something that never gets stated outright. That something is the chance of losing one’s data. [Read more…]

Filed Under: Privacy, Responding to news, Security, Webhosting Tagged With: domains, Privacy, saas, whois

Cloud computing & Cybersecurity: The changing trends

4th January 2019 by thom Leave a Comment

Cloud Computing and Cybersecurity is slowly becoming one with each other. Without the latter, the former isn’t feasible.

A simple way to describe Cloud computing is that it’s the delivery of on-demand computing services through the means of internet, basically using someone elses computing power. It is used to deliver the processing power needed to run applications, storage of files or processing requests. Generally, to a person that needs those services, but lack the required infrastructure. It was storage that Cloud computing was initially famous for. (Rossi, B. 2017)

Now, let us see some trends that are quickly changing in Cloud Computing and Cyber Security. [Read more…]

Filed Under: Big Data, New Media, Responding to news, Security Tagged With: Artificial Intelligence, cloud, cloud computing, security

WHAT IS CRYPTOJACKING AND HOW TO PREVENT IT?

7th December 2018 by thom Leave a Comment

Cybercrime is at an all-time high. Although, the entire tech industry is doubling down on security; efforts have still been ineffective to stop the evil.

One of the many reasons for that is because black hats are becoming more ingenious with their exploitative methods.  Crypto jacking is one such example of their cunning minds. We can describe it as the unauthorised use of someone’s hardware to mine cryptocurrency. In simpler terms, it means that a program hijacks your computer, tablet or mobile phone and use the device to mine Cryptocurrencies. [Read more…]

Filed Under: Money, Responding to news, Security Tagged With: antivirus, cryptocurrency, cryptojacking

The Importance of Multi-Factor Authentication (MFA)

15th June 2018 by thom Leave a Comment

With relentless increase in digital crime and online frauds, proper safeguarding measurements have become more important than ever.  Studies have shown (Solange, 2014) that big companies and celebrities have been a victim of hacking in the recent past, so what can stop the digital criminals to not target you?

Multi-factor Authentication Method Can Help!

One verified way to ensure your account and data safety is the multi-factor authentication method. Usually, passwords are used to protect the confidential data but relying on them solely is not a wise option. Multi-factor authentication (at least 2FA) method also known as multiple-factor verification is basically a mechanized double check process to verify the identity of the logger. With this method, accounts remain safe and well-protected even if the passwords have been figured out. [Read more…]

Filed Under: Privacy, Responding to news, Security Tagged With: 2fa, authentication, mfa, multifactor authentication

Practical Tips for Password Security

1st June 2018 by thom Leave a Comment

In this digital age, passwords are just like valued currency and should be set with great care to prevent an unauthorized access to confidential data. This new world is digitally connected and allows an easy transfer of data from one network to another. Where this advancement has made our lives quicker and easier, it has also increased the risk of data leakage.

To protect the sensitive information contained by online accounts, passwords are set. But the problem is that hackers are efficient enough to crack the passwords and obtain desired information. To prevent this activity, the only solution is to strengthen the password security so nobody will be able to break the lock. [Read more…]

Filed Under: Privacy, Responding to news, Security, Tutorials Tagged With: advice, news, passwords, security

GDPR and Practical Things to Look Out For

16th February 2018 by thom Leave a Comment

GDPR or General Data Protection Regulation is the primary law regulating the companies on how to protect the personal data of European citizens. The European Parliament and Council passed it back in April 2016 and it will be replacing Data Protection Directive 95/46/ec in spring 2018. It is mandatory for the companies that are already in compliance with the Directive to comply with the new privacy law by May 2018 to avoid stiff penalties and fines in case they fail to do so. (Lord, 2018) [Read more…]

Filed Under: Internet of Things, Privacy, Responding to news, Security

Finally! Office 365 – OneDrive Sync can now sync # and %

4th September 2017 by thom Leave a Comment

It took a while, but OneDrive Sync can now sync files that contain # and %. Microsoft has decided not to roll this out to all tenants yet, but administrators can now enable this for their Sharepoint sites and OneDrive for Business users. [Read more…]

Filed Under: Responding to news, Tutorials, Webhosting Tagged With: Big Data, cloud, internet of things, Office 365, onedrive, sharepoint

  • 1
  • 2
  • 3
  • Next Page »
Follow @th33mstra

Thom Heemstra
@th33mstra


  • about 53 years ago
    Reply Retweet Favorite

Recent Posts

  • Recent Developments in Blockchain
  • Top 5 SEO Mistakes Made By Marketing Agencies
  • Why Is Link Building Important For SEO?
  • Internet Privacy Issues And Ways It Can Be Compromised
  • 10 Practical Tips to Improve Online Privacy

Categories

  • Announcements
  • Artificial Intelligence
  • Big Data
  • BlockChain
  • Internet of Things
  • Money
  • New Media
  • Privacy
  • Responding to news
  • Security
  • SEO
  • Tutorials
  • Webhosting

Copyright © 2023 · Agency Pro Theme on Genesis Framework · WordPress · Log in