Have any question?
Call (403) 210-2927
Call (403) 210-2927
Smart products are everywhere nowadays, ranging from video doorbells and assistants to more niche appliances… including breast pumps and floss dispensers. However, despite all of these devices being very different, most have one thing in common.
It just so happens that the U.S. Federal Trade Commission is concerned about this commonality, as it’s the fact that many don’t publicize when updates are available—or even provide them at all.
Do you have any technology-related projects that require hardware acquisition? It’s a great time to consider it now, especially considering the expected increase of computing hardware costs. Working with a project management team like OnSite I.T. can take out some of the risk, responsibility, and financial burden you might have for any new hardware acquisition during the project management cycle.
Happy Valentine’s Day! While this holiday is all about love, it just so happens to fall smack in the middle of tax season in the United States. So, while you’re hoping to get a sweet message from that special someone, there’s a chance you might also receive a text or an email from the Internal Revenue Service… or is there?
As it turns out, you won’t… but that’s a fact that scammers are hoping you won’t know.
After the tragic events of September 11, 2001, terrorism became a topic everyone heard about daily. The "War on Terror" lasted over a decade, toppling governments and sending a clear message that terrorists would be hunted down relentlessly. While major terrorist attacks have happened since then, the battleground has shifted. Today, one of the biggest threats comes from cyberspace. Let's take a closer look at the rise of cyberterrorism.
Want to be a business without hearing how artificial intelligence is changing the industry? Good luck; it’s a big deal that this technology has flourished in recent years, and businesses have found all kinds of ways to implement it. While AI has significant capacity for growth and to be an excellent tool to help human society, a lack of AI regulation has led some to believe that it’s only a matter of time before something bad happens that ruins a good thing for everyone.
As an information technology provider, we are tasked with helping your business make the best decisions possible related to your IT infrastructure. In this role, we offer a gentle recommendation that you purchase hardware you expect to need over the next year as soon as possible. If you don’t, you might be left high and dry without any good options to choose from.
Blockchain technology is in the zeitgeist, but few people know how to explain it to someone else. They might think that it’s something to do with Bitcoin, to which they would be right, but it’s more broad than that. Today, we want to explore what the blockchain is and some of the ways businesses are using it.
Subscription services are all over the place these days, and we’re willing to bet that you have a couple of lingering subscriptions that you’ve either forgotten about or don’t care enough about to cancel immediately. The Federal Trade Commission, however, seems to care enough to take action with a ruling that makes canceling subscriptions easier. Businesses won’t be able to add more hurdles to their subscription cancellations, which is good for end users.
You may remember the hubbub and hullabaloo that ensued when Josh Allen, a digital artist, won first place at the 2022 Colorado State Fair’s Fine Arts Competition in the Digital Arts/Digitally Manipulated Photography contest with an image—"Théâtre D'opéra Spatial"—that he had created using AI. Allen continues defending his work, now butting heads with the Copyright Office.
Problems with cybersecurity can really sink your business. Unfortunately, more opportunists are out there today looking to profit off of business’ lack of vigilance. One example of this are large-scale scam operations that have been running in Southeast Asia, and they are now spreading to other parts of the world. These scams, called "pig butchering" scams, have caused major harm, with around $75 billion lost worldwide in 2023.
Sextortion scams are far from glamorous. These attacks involve a scammer claiming to have compromising photos or videos of their target engaged in explicit activities—often suggesting this footage was captured through their online behavior. The scammer then threatens to release this material unless a ransom is paid.
The state of Internet security is always a trip. There are scams literally everywhere and there are better minds than ours that want to solve the myriad of problems that users run into online. One such platform is the secure communications software Telegram founded by Pavel Durov. In this attempt to revolutionize the instant messaging space, he’s found himself in some pretty hot water. Let’s dive right in.
On Friday, July 18th, a global update—codenamed “Falcon”—to cybersecurity company CrowdStrike’s software triggered events that brought major infrastructures and societal needs to their knees… despite affecting less than one percent of all Windows systems.
Now that about one and a half weeks have passed, let’s check in and see what happened, both leading up to this event and in the days since.
We know that living in a constant state of fear of being scammed is not ideal, but it’s the unfortunate reality of living in today’s technologically advanced world. The good news is that it’s never too late to learn how to avoid them! Let’s discuss how you can be more aware of the challenges of scams not only in a business setting, but in everyday life.
Many individuals are concerned about the future of AI, including the White House, which encouraged companies like Amazon, Anthropic, Google, Inflection, Meta, Microsoft, and OpenAI to commit to helping with the management of artificial intelligence. Other companies, including Adobe, Cohere, IBM, Nvidia, Palantir, Salesforce, Scale AI, and Stability, have joined in this pledge to maintain “the development of safe, secure, and trustworthy AI,” according to the White House.
Zero-day vulnerabilities are never fun, but this is especially the case with popular devices, like the many that use the Samsung Exynos modem. Google’s Project Zero has discovered 18 such vulnerabilities in these chips, four of which allow for remote code execution. Why should you be concerned about these vulnerabilities and what can you do to minimize your risk?
Interested in seeing what we can do for your business? Contact us to see how we can help you!
Our network assessment will reveal hidden problems, security vulnerabilities, and other issues lurking on your network.
Learn more about what OnSite I.T. can do for your business.
OnSite I.T.
429 14th St. N.W. #104
Calgary, Alberta T2N 2A3