Follow us at
Sapient Coach
  • Blog
  • Services
  • Contact
  • EspaƱol

A Prescription for an Information Security Risk Management Program

4/21/2018

0 Comments

 
Cybersecurity Sapient Coach
A lot have been investigated, written and said about how to better protect companies against the unstoppable proliferation of advanced and sophisticated cyber-threats/attacks. By default, and by common sense, we tend to think that by adopting and implementing cutting-edge security technologies, companies will be on a better position to stop, prevent, and reduce security threats from cyber-criminals. This is not so far from reality. Lots of technologies have emerged and being adopted to reach that goal. Among these technologies are: Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Firewalls, Antivirus, Network Access Control (NAC), Proxies, Gateways, Advance Threat Analytics (ATA), Sandboxes, Multi-factor Authentication (MFA), Artificial Intelligence (AI), and Machine Learning (ML) solutions to mention a few.  However, security and data breaches still happen and are on the news all around the world, every day.

Read More
0 Comments

Cyberwarfare: Artificial Intelligence in the Frontlines of Combat

7/11/2017

0 Comments

 
Picture
In the last decade of the proliferation of the World Wide Web, there has been a shift from normal human combat warfare to electronic warfare, where a person with a computer can do more damage to the infrastructure of a country than thousands of soldiers. The amount of data, intelligence, and damage generated by such warfare is astronomical. This type of warfare requires artificial intelligence and Expert Systems to go to the forefront of the battlefield in order to analyze data and trends to identify potential attacks and provide countermeasures to such attack. AI has put in a new perspective how Decision Support Systems (DSS) improve defense. DSS implemented today are in place to stop and deter in the shortest possible amount of time a cyberattack, and assist cyber defenders in finding the correct response.


Read More
0 Comments

First Line of Defense Against WanaCry Ransomware

5/15/2017

0 Comments

 
SapientCoach WannaCry Ransomware Decryptor
​WannaCry or Wanna Decrytor ransomware is an informatic virus that attacks Windows operating system based computers primarily (including servers) by taking advantage of system vulnerabilities exploited by Eternalblue, a tool believed to be developed by the USA National Security Agency. What is the unique effect once infected by the virus? Well, you will notice it fast. The system will show you a Popup window letting you know that your computer is infected, all your files are encrypted, and for you to recover it all, they require a ransom payment using bitcoins. Unless you make the payment, all your files will stay encrypted. The worst thing about this virus is that, if you do not pay in a certain period, the ransom payment will keep rising.
But, wait! The intention of this article is not to create panic. Even though you should panic if your computer got infected and you didn't backed up your files recently (last day or night before the infection). 

Read More
0 Comments

Technology Security Tips and Hints (Part I)

1/12/2015

0 Comments

 
security Tech Tips Sapient Coach
As of today, we have many technological gadgets around us.  We have them at home, in our offices, automobiles, even as personal dressing accessories. Definitively we live in a technological era in which smart devices allow us to make collaborations,  and to share personal or business data on social networks, such as Facebook®, Twitter®, LinkedIn®, Instagram®, and Google® to name a few.  We also have the never ending clouds on our environment, such as Dropbox®, Box®, AmazonDrive®, GoogleDrive®, and Microsoft OneDrive®, among others.

We have entered into an era in which even baby boomers  interact with mobile devices and high-end technologies, not to mention millennials who were born with their genetic codes already programmed for these technologies.  Even my niece, less than one year old, uses an iPad.  We enjoy technology.  Or at least, marketing departments make us believe it is a high-priority need, and convince us to rush and get the latest gadget.


Read More
0 Comments
    Gilberto Crespo

    Author

    Dr. Gilberto Crespo is an information security researcher & technology expert.

    He has been working for more than 20 years in the information technology industries, cybersecurity, financial, higher education, and life coaching.  He is also a motivational and leadership speaker.

    View my profile on LinkedIn

    Archives

    June 2022
    January 2021
    May 2019
    April 2018
    March 2018
    July 2017
    May 2017
    February 2017
    September 2016
    July 2016
    April 2016
    March 2016
    January 2016
    December 2015
    November 2015
    August 2015
    June 2015
    May 2015
    February 2015
    January 2015

    Categories

    All
    Android
    Apple
    Business
    Certification
    CloudComputing
    Coaching
    Computers
    Covid19
    Cyber
    Cybersecurity
    Education
    Employment
    Faith
    Goals
    Google
    Hackers
    Heaven
    Homeopathy
    Inspiration
    IOS
    IoT
    Jobs
    Microsoft
    Motivation
    Nature
    Online
    Potions
    Publication
    Remedies
    Research
    Security
    Skies
    Sun
    Technology
    Tips
    Work
    Zombies

    Subscribe to email updates, it's FREE

    *required

Copyright © 2023.  This site is part of Sapient Coach © 2023.  All rights reserved.  All content posted on this site is a commentary or an opinion, and is protected by freedom of expression.  Sapient Coach is not responsible for content written by contributing authors.  The information in this blog is provided for educational and informational purposes only.  It is not intended as a substitute for professional advice of any kind.  Sapient Coach © assumes no responsibility for the use or misuse of this material.  The use of this web site indicates your acceptance of these terms.  All brands, trademarks and service marks mentioned on this site are the property of their respective owners.

Designed by Blig Consulting

BligConsulting.com