Insider Threat – the Levandowski Effect

Brittany Pescetto Blog

In a recent study by IBM, reserchers found that over half of data breaches are a result of internal actors leaking sensitive data, and currently ex-engineer Anthony Levandowski is under fire for doing just that. Levandowski, a former technology lead for Alphabet, Google’s parent company, and creators of the self-driving car Waymo, is currently in the technological legal battle of his …

Wanna Cry?

Brittany Pescetto Blog

Ransomware is a malicious software that locks your data until you pay a “ransom” to retrieve it. Last week, to the terror of many business owners, WannaCry ransomware spread rapidly to over 150 countries, leaking tons of data and rendering many banks, hospitals and universities, and governments helpless against encryption.  WannaCry’s asking price? $300 in Bitcoin, a price that doubles …

Understanding PCI DSS

Brittany Pescetto Uncategorized

Panthera Technologies provides solutions for companies searching for a secure interface in which to transfer sensitive information. Does your business accept credit cards? Do you need it to? In order to open your Maryland area small business up to the enhanced profit potential that accepting credit cards can provide, you’ll need to understand what responsibilities you take on by accepting …

Understanding Automation

Brittany Pescetto Uncategorized

Business technology is the bane of the modern worker. No matter how well-intentioned the members of your staff are, when they have computer troubles, it complicates everything they are trying to accomplish. This, in turn, complicates every goal you are trying to accomplish. The automation of IT service delivery gives you a direct line to a stronger business by streamlining …

IT Services Done Differently

Brittany Pescetto Uncategorized

We’re in this business to help other small businesses grow and move forward.  It’s as simple as that.  We’re driven by the philosophy that if we help local businesses solve their IT issues so they can become more profitable and successful, then we will inherently grow along with them.  There is no catch, no gimmick, just experience and best practices …

The Modern Office

Brittany Pescetto Blog

There are countless ways the modern office transcends the office of yesteryear, but the most obvious is probably the layout. Where not long ago cubicles were all the rage, now the open office setup is most popular, as business owners and executives look to cost effective strategies to stretch their budgets and stay flexible. The open office doesn’t offer much …

Understanding Cloud Computing

Brittany Pescetto Uncategorized

Free yourself from traditional IT with Cloud Services Cloud computing is managed, shared applications, development platforms, or computing infrastructure accessible via the internet. It provides options such as bandwidth and on-demand computing power with flexible capabilities normally purchased as a metered service. The National Institute of Standards and Technology (NIST) defines cloud computing as a “model for enabling ubiquitous, convenient, …

Understanding Ransomware

Brittany Pescetto Blog

Like many online attacks, ransomware is very descriptively summed up by its name–simply put, it’s malware that allows hackers to demand a ransom. This malware classification follows a simple, but devious, method of attack: the program will encrypt files on the host system and demand that the user pay to regain access to their files, typically asking to be paid …

IT Threat Glossary

Brittany Pescetto Blog

The Internet can be a dangerous place, especially now that hackers are taking advantage of advanced tools and threats. New types of malware, ransomware, and viruses are being created every day, for the express purpose of seeing your organization fail. If your business isn’t using comprehensive security solutions, you remain vulnerable to threats that can potentially compromise and damage your …

Understanding the Sarbanes-Oxley Act

Brittany Pescetto Blog

For accountants that deal with publicly owned companies, ensuring your IT infrastructure is SOX-complaint is a must. The Sarbanes-Oxley Act was adopted as law to ensure that investors have reliable data in which to make their financial decisions. The law was, in large part, a result of the accounting scandals that took place around the turn of the century including …