"The Exynos 9 Series 9820, which will undoubtedly be used in the international versions of the #Galaxy S10, has a neural processing engine (NPU) that is claimed to deliver up to seven times faster AI performance than the S9’s 9810. NPUs can be used to speed up tasks like image processing and AR." What is a NPU? I had to do some Googling and I'm still not 100% sure as to if they're the same thing.
Highlights from an Engadget article called "What do made-for- #AI processors really do?" #machinelearning computations that used to happen in the #cloud can happen on the device this improves lag time, #datasecurity, and saves energy.
У тебя Android? За тобой следят!
Компания Nightwatch Cybersecurity сообщила о том, как хакеры следят за пользователями устройств Android. Используя уязвимость в системе, хакеры могли следить за передвижениями юзеров с точностью до метра! 😨
Злоумышленники могут воспользоваться брешью через Wi-Fi. В зону видимости попадают все устройства, находящиеся в поле доступа сигнала.
Из-за бреши сторонние приложения могут получить всю информацию о принимаемом сигнале и определить, где находится пользователь.
И такая уязвимость присутствует во всех версиях операционной системы Android.
Также недавно стало известно о новом способе выкрасть информацию с любого устройства с помощью NFC-чипа.
Вот такие дела! Так что защищайте свои устройства и отслеживайте опасные приложения. О приложениях для безопасности смартфона мы писали для вас ранее под тегом #fortel_android. 👇
West Coast Service Technician Joe Jennings provided service to Naval Air Station Fallon, Nevada and Edwards Air Force Base, California over the past couple of weeks, and he managed to capture a couple of selfies with the jets. Joe is an invaluable member of the SEM team and we appreciate his dedication, enthusiasm - and selfies! #SEMservice#datasecurity#datadestruction#airforce#navy
Upgrading your businesses computers or systems?
Deleted ≠ Destroyed
Most people we speak with assume that to delete something is to get rid of it forever. However, this simply is not true when it comes to sensitive data on hard drives.
In the world of information security deleting something means to hide it from view, but make no mistake that data continues to live on and can be easily recovered with some basic data recovery software.
Trust us when we say that data destruction is not the area to cut corners on. A mistake here can cost your business more than a few dollars and can seriously harm its reputation as safe and secure.
"2018 has undeniably marked a shift in how we deal with personal data and data security. The collective experience we accumulated in the course of a series of hacking attacks over the past couple of years was finally combined with milestone legislative instruments that take a definitive stand in the battle against cybercrime and in promoting data security." #datasecurity#datadestruction
Chess or Atari? Often we are asked when should an organization start implementing and commit to security practices, controls, compliance, resources? Answer is at the very beginning, or before. At the time product idea is born and first line of code is written is when security and risk mitigation starts.... anything later would and will be costly ⚠️ Compromised customer data, network breaches, compliance issues, unsellable software with security gaps are just to name few problems companies will face if not prioritizing security and risk mitigation early... 🚨 PreCog Security built security packages specifically catered for Startups to address these 🌈🦄 ☕️ Send us an email [email protected] to learn more. #securestartup#securefirstcode#securesdlc#infosec#innovation#cybersecurity#education
The Ultimate Disaster Recovery Checklist ✔️
STAY ONE STEP AHEAD OF POTENTIAL DISASTERS
Prepare yourself before disaster strikes. When it comes to data backup and disaster recovery (BDR), being prepared for potential disasters is key to keep your business running. It’s not only important to have a disaster recovery solution you trust, but to make sure you test it as well.
We will help keep this DR checklist on hand.
Prior to a disaster ever occurring (and unfortunately it’s a matter of when and not if) ask yourself thefollowing:
• Do you have a disaster recovery solution in place?
• Do you trust it?
• When was the last time your backup was tested?
• How long does it take to recover from your current backup solution? __
• How long can you realistically be down? 1 hour? 1 day?
• What is the financial cost of downtime to your business? __
• When a disaster occurs, is there an offsite copy?
In the event the disaster moment has occurred—call us and we will guide you through the action steps.
Recently a data breach hit the Radisson Hotel Group.
A data breach is a possibility for all businesses – no matter how big or small. Your remediation plan is key -- do you have one in place? Contact us for more information.
To read more about the #Radisson Breach, click the link in bio.
Security literally in the palm of your hand – no matter which way you unlock it. #GalaxyS9
Award-winning #cloudstoragesystems from Sky Drive developed by deploying groundbreaking technology for catering the diverse #datasecurity and management needs of businesses of all sizes. Register on our website now for more details.
For more information please visit -