May 2024

Navigating Public WiFi: Understanding Cybersecurity Concerns and Best Practices

Blogs, IT & Cybersecurity|

As a cyber security professional, I must address one of the most prevalent aspects of modern connectivity: public WiFi networks. Public WiFi has become ubiquitous in today's interconnected world, offering convenience and accessibility. However, alongside its benefits, public WiFi poses significant cybersecurity risks that individuals must be aware of and actively mitigate. This blog post [...]

May 2024

How to Secure IoT Devices in the Workplace

Blogs, IT & Cybersecurity|

The Internet of Things (IoT) is transforming how we work, live, and play. IoT devices like smart sensors, cameras, printers, thermostats, and wearables can collect and transmit data, automate tasks, and enhance productivity and efficiency. However, IoT devices also pose significant cybersecurity risks, as they can be hacked, compromised, or used as entry points for [...]

Apr 2024

Revolutionizing User Experience Across Platforms with PWAs

Blogs, IT & Cybersecurity|

The evolution of Progressive Web Apps (PWAs) marks a significant milestone in the history of software development. PWAs blend the capabilities of traditional web pages with the robust features of native applications. From their conceptual inception to their growing adoption today, PWAs have continued to redefine user interactions with digital platforms. Here's a closer look [...]

Mar 2024

3 Steps to Take After a Data Breach

Blogs, IT & Cybersecurity|

As a Director of Information Technology, I know that it is crucial to be aware of the steps to take in case of a data breach. This blog post will discuss what to do if your business or personal information is hacked, stolen, and out on the Dark Web. The first step is to secure your [...]

Mar 2024

10 Common Myths and Misconceptions About Cybersecurity

Blogs, IT & Cybersecurity|

As a Director of Information Technology, I understand the importance of cybersecurity preparedness for businesses. In this blog post, I will discuss 10 common myths and misconceptions about cybersecurity that can prevent safeguarding your enterprise effectively. 1. Sophisticated security tools can protect us from everything: Investing in high-end security tools and solutions is certainly an [...]

Jan 2024

AI and Security: How to Defend Against the Misuse of AI by Hackers

Blogs, Artificial Intelligence, IT & Cybersecurity|

As the Director of Information Technology, I am responsible for ensuring the security and integrity of New Resources Consulting organization's data, systems, and networks. I am also keenly aware of the opportunities and challenges that artificial intelligence (AI) brings to our field. AI is revolutionizing various industries, but it is also bringing forward security and [...]

May 2022

Big Data & Analytics for Beginners

Blogs, IT & Cybersecurity|

Thank you to Jim Donahue, Owner of Rising Tides Analytics, for his collaboration in creating this piece. “Big Data” is one of those hot-button terms that keeps popping up in headlines but doesn’t necessarily explain itself—or its inherent value. At first, big data sounds like something that would only be thrown around at an obscure startup, but, [...]

May 2022

How To Get Started with Analytics in 3 Steps

Blogs, IT & Cybersecurity|

Thank you to Dustin Schimek, Founder of Data Ideas, for his collaboration in creating this piece. “Analytics” can be an opaque term. It’s substantive, representing pages and pages of reports, data, charts, and graphs. Because it’s a term that encompasses such a large conversation, it can be difficult to pin down—especially when it comes to practical [...]

Go to Top