Posts

Showing posts from September, 2020

What Makes a Security Plan?

      Hello, and welcome back to my blog. This week, I would like to quickly discuss the levels that go into making a security plan. These types of plans are an important tool for IT departments and Cybersecurity Administrators to design a plan that will help protect or slow down an attack on the network.     Of course, security plans can vary from company to company; however, their purpose remains the same, with threats looming every day. With IT managers adjusting in response to the ever-changing threats, the created security plan must be designed to stop or slow down any attempt to breach network defenses. Below we will look at the principal components of a security plan and what they entail.    Separate Networks              As the name suggests, having more than one network can protect company assists from hackers and the like. The reason being is that having every computer on one network would lead to issues if that subsequent work were to fail, which would stop operati

GPT vs. MBR Partitioning, A Quick Look

  Partitioning is a way to manage space for your server or PC that ensure the OS is in the right place to manage data. When a new medium is installed on a server or a personal computer, the operating system will not install data until the new storage device has been partitioned. However, some users may not understand which partition method to use when prompted. Below will outline the difference between GPT and MBR partitions, their limitations, and level of security.  What is GPT and MBR partitions?                 Master Boot Record or MBR is an older method that is used for the standard BIOS partition table. Simultaneously, GUID Partition Table or GPT is used in Unified Extensible Firmware Interface or UEFI. “ GPT is new. But the new one is not always better than the old one. Many vendors utilize MBR technology since it is still predominantly used in the real world. GPT disks have the advantages of partition size, the number of partitions, and resilience. If a computer that uses

The different operating systems and peripherals that we use every day

Have you ever taken a stroll through your local tech store or browsed through your favorite tech website and saw all the crazy peripherals on sale? From the different keyboards, mice, webcams, mousepads, to the components that help cool your machine to the sleek cases that house everything, all these accessories can be overwhelming to those that are unfamiliar with what these attachments do.   Though essential peripherals, such as the keyboard and mouse, can become confusing as there are many different arrangements and choices for one to choose. From gaming-focused to minimalist design, indeed, there are different flavors for everyone. The keyboard that I use at home is a cheap mechanical board that I purchased on Amazon a few months ago. Though the board does what I want it to do, I tend to find myself looking at other boards on the market. I use an Apple wireless keyboard with my iPad for my travel setup, which works reasonably well. Now I am leaning toward using flat style or chicl

Using Cloud Computing: What to consider

        Many users who access applications through the Cloud seem to do so without understanding the complications that can arise if something were to go wrong. However, the benefits of using apps from the Cloud, such as iCloud, for example, which allows apple users access applications like Keynote and Pages, can create documents easily from any desktop with a web browser. The benefits of these types of services can be easy to use, be cost-efficient, and where backup and recovery can be quickly made. These hosting services can also offer another benefit, which is 24/7 support as well.      Unfortunately, there are some downsides to these types of services. As many businesses may use services already, the biggest issue is trusting these services with your business's sensitive data. There have been cases where Software as a Service or SaaS providers have been targeted by hackers more frequently and have been easily compromised. This can be troublesome as this service is the most ta