Posts

Showing posts from December, 2020

3 actions that can help optimize technology costs

 Companies have chosen to adopt cloud computing with a view to reducing costs especially in the IT department. This procedure consists of contracting computational resources that companies need for their systems under the service modality, delivered through an internet connection. This service provision allows an important reduction in costs with local resources - servers, network and infrastructure - since they are based on subscription services. This means that hardware and software are leased and IT departments acquire quotas that match their storage needs. This format is also well regarded in the eyes of the finance team, due to the fact that it does not require capital immobilization, freeing up cash for activities and investments that generate direct return for the business. The Information Technology Analyst will collect information from end users about system performance. They over the projects and handle the upgrades, hardware, and software installations.  It is important to

Intrusion testing: what it is, the importance and how to use it

 According to a study by the OTRS Group, 61% of Brazilian, American and German companies deal with at least one security incident per week. Of these, 18% classify the risks they are exposed to as “very high”. To proactively address these vulnerabilities, some methods have been developed and are implemented in the IT routines of companies of all sizes. One is the intrusion test, which we will discuss throughout this article. Read on to understand what an intrusion test is, why this method is important to your organization and how it works! What is intrusion testing? Also known as a penetration or security test, the intrusion test is performed by experts who simulate targeted attacks to detect weaknesses in the security of company data. Thus, it is possible to solidify an efficient defense strategy. Technicians are well-versed with the brass tacks of the services/products, which they provide support for. If IT Technicians are unable to resolve a problem, it is escalated to the senior te

How to identify risks to a company's information security?

 As stated, data that is entrusted under the custody of a particular business can be accidentally deleted or stolen in a criminal manner. Contrary to what many people imagine, one of the main focuses of cyber attacks is small and medium-sized companies. This is because it is assumed that the IT structure is not robust enough. Therefore, it is necessary to invest in mechanisms that are able to avoid or minimize risks. In the topics below, we give some examples of what to do to identify threats. 4 digital security threats that the company must protect itself from. Perform frequent audits An audit in the information technology sector is nothing more than a systematic assessment of security. It must be able to analyze the infrastructure of the environment, systems, software, user practices, among other points. So, have a schedule at your auditing company. If such analyzes are carried out frequently, it will be simpler to predict risks of data leakage. Know how to analyze the results An IT

Data security and privacy

 "At this point, Sérgio, you have to be very careful! Several companies believe that maintaining ERP on their local servers will be more secure because they have full control over their data. However, it may not be so." Does your company have a good security system, with cameras in all rooms and night watchmen? Well, and if your organization were invaded, or suffered from a fire or flood, would you be ready to resume your activities quickly? The truth, Sérgio, is that most companies are barely prepared to deal with mistakes made by their own users. So again, ERP in the cloud can be considered a better option and I explain why: ERP in the Cloud will be out of the local environment, therefore, protected against natural disasters, invasions, thefts and other setbacks that your company may suffer. The providers of this service will be responsible for maintaining their systems on servers located in secure locations. This happens because this is the focus of their business, so this

IT career is not so Pop anymore

 IT nowadays innovates so much and so fast that it is no longer fun to follow, it is something tedious that each year is renewed and complicated. People simply gave up on following and the fact of talking about their  certifications is of no importance, nobody knows what it is about, they just know that in a few months this information will be passed and dozens of much better and innovative things have already appeared. It doesn't matter how much you study, how many certifications you have or how complex your IT activity is, you will always be “Cara da Informática“, “ Cara da TI “, “ O Rapaz dos Computadores “, this is so real and it is noticeable that young people are no longer interested in IT. Sad this post is not it? Are you getting depressed? Calm that it will improve, I think ... I will not deny, this part of  young people being disinterested  in your career I think is great. Less competition  and a huge market at my disposal, too bad this is not so. For it is not only young

Computer achieves quantum supremacy

 In 2011, computer scientist Scott Aaronson of the University of Texas outlined the fundamentals of what a light-based quantum computer would be , but, given the opinion of fellow physicists that it would never work, shelved the project - to see it come to fruition. nine years later. “I didn't think it would happen anytime soon. I take my hat off to them. ” Aaronson was referring to physicists Chao-Yang Lu and Jian-Wei Pan, who made it possible for the quantum computer Jiuzhang to achieve quantum supremacy this Friday (4). . South China Morning Post /  This expression refers to the power of a quantum computer to solve problems that classical computers would not be able to - at least, not in a timely manner. In 2019, Google claimed for itself the feat , with Sycamore, which took just three minutes to do the same calculation that would take three days for a supercomputer to achieve the same result. Desktop Support Technician is known as one of the backbones of IT organization. They

USE OF BLOCKCHAIN ​​FOR REGISTRATION

 One of the main discussions about the usefulness of Blockchain for education concerns the registration of diplomas. The diploma is considered one of the most important documents issued by educational institutions (GRECH and CAMILLERI, 2017). The diploma serves as a document proving the training received by the student and gives him the necessary authorization to exercise his profession. Currently, there is a growing search for courses in the Distance Education (EAD) modality, so that such courses can be offered, it is necessary to make a wide use of IT resources in Education (PAULA et al., 2018). The entire EAD process takes place through virtual learning environments (VLE), including the availability of the student's diploma at the end of the course. However, there are several cases of forgery of diplomas and this can compromise the credibility of educational institutions and even put the lives of people at risk, by placing unskilled professionals in the market. In this context,

Aadhaar: the worst data leak in years

 Every year, companies of different segments and sizes experience data leaks. However, the case of the Indian biometric registration system, Aadhaar, is considered the worst in recent years. The system was developed for digital scanning of the iris and face of, until then, 1.3 billion inhabitants of India, for citizens' registration. In March 2018, the company suffered a catastrophic data leak. About 1 billion biometric data have been stolen, and can still be found for sale on the dark web. On the date of the incident, an information security researcher reported a vulnerable endpoint to the authorities, who, in addition to not taking measures to resolve the situation, denied the failure and the data leak. Dell SonicWall Support Engineers must have the analytical skills to determine the right course of action to resolve issues, such as encrypted threats and ransomware attacks. They provide both team members and clients the status of the problems and the plan of action they will und

IT certifications - be it the complete meal for the company

let's start by explaining to those who don't know the Information Technology area. Which areas does IT work with? Information Technology (IT) is the knowledge area responsible for creating, administering and maintaining information management through devices and equipment for accessing, operating and storing data, in order to generate information and data that support the taking decision-making. In this context, IT covers the entire infrastructure for this information to be generated, transmitted, stored and processed.  This includes assembly and operation of machines (servers, PCs and other elements), architecture, installation and operation of computer networks, programming and operation of information systems, among other aspects and activities.  What is the importance of certifications? An IT certification is an instrument that, theoretically, attests (to anyone interested) that the professional who holds it is versed in a certain technology. It is, therefore, a form of met

Enables chatbots to be used

The chatbots are the biggest allies of the companies that have a high demand and need to reduce the queues without spend on signings. These systems are nothing more than algorithms prepared to offer answers to certain questions from customers. Some chatbots are equipped with artificial intelligence and are able to interpret the questions, offering pertinent answers. Others are programmed to answer specific questions, which are usually chosen according to the most recurring problems that consumers have. Chatbots act as a kind of "filter", solving or allowing people to solve the simplest problems independently. This makes attendants free to focus on more complex resolutions. As the role of technology has grown, the risks to security have shot up too. This is why companies are happy to pay handsomely for a Cyber Security Consultant to protect their business against those dangers One of the great advantages of chatbots is the availability, after all, they can serve 24 hours a day