Founder and CEO of Kerkhoff Technologies Incorporated and Crafty Penguins
Kerkhoff Technologies The need to back up data has been around since floppy disks. Data loss happens due to viruses, hard drive crashes, and other mishaps. Most people using any type of technology have experienced data loss at least once. There are about 140,000 hard drive crashes in the US weekly. Every five years, 20%…
From Alexa to Siri, AI is already all around us, but names like ChatGPT, Dall-E and Jasper have blown up the internet. Let’s decode some of the language
Your data is one of your most valuable business assets. Keeping it safe should be one of your main priorities.
A new study shows that only a third of businesses place detection as their main priority, while two thirds say prevention is their primary focus.
AI chatbots have taken the world by storm lately. But for all the fun they offer, criminals have been finding ways to use AI for more sinister purposes.
Recently, the biggest ever DDoS attack was reportedly blocked. Worse still, more businesses are being targeted with criminals demanding huge ransoms
Kerkhoff Technologies Technology vulnerabilities are an unfortunate side effect of innovation. When software companies push new updates, there are often weaknesses in the code. Hackers exploit these. Software makers then address the vulnerabilities with a security patch. The cycle continues with each new software or hardware update. It’s estimated that about 93% of corporate networks…
If you employ anyone aged between 16 and 19, you need to pay special attention to the cyber security training you’re giving your team.
Kerkhoff Technologies Imagine you’re going about your day when suddenly you receive a text from the CEO. The head of the company is asking for your help. They’re out doing customer visits and someone else dropped the ball in providing gift cards. The CEO needs you to buy six $200 gift cards and text the…
Kerkhoff Technologies Misconfiguration of cloud solutions is often overlooked when companies plan cybersecurity strategies. Cloud apps are typically quick and easy to sign up for. The user often assumes that they don’t need to worry about security because it’s handled. This is an incorrect assumption because cloud security is a shared model. The provider of…