The federal Tax Cuts and Jobs Act signed into law in December 2017 included two important changes to the U.S. tax code that provides incentives for businesses to invest in new security, fire protection and alarm systems.
A bill banning U.S. government use of Dahua and Hikvision products made in China was passed by both chambers of Congress and signed into law by the President on August 13.
The relevant clause in the 1,300-page NDAA defense appropriations bill states:
Making a Difference
Green Point Wellness is a licensed medical cannabis dispensary in Linthicum Heights, Maryland. Its goal is to promote wellness and patient freedom, and provide superior customer service to those in Anne Arundel County and the rest of Maryland. According to dispensary founder Tony Toskov, “By providing the highest quality products to suit the specific ailments of each patient, the whole community benefits by having alternative medical treatment choices.” Continue reading
Ransomware infections can be devastating, but the good news is that there are preventive measures you can take to protect your IT infrastructure from being hijacked:
- Back-up all critical information and test backups regularly. Network-attached backups can also be affected by ransomware, so critical backups should be stored offline.
There’s a better way for organizations to utilize their IT staff – free them up so they can work on strategic projects that improve competitive position, market share, and the bottom line. To help you achieve this, NuLeaf can handle all of your day-to-day IT monitoring and maintenance, or just when you need some extra help. Check out our ManageIT portfolio…
Data deduplication is a method for reducing storage needs by eliminating redundant data so that only one unique instance of the data is actually retained on the storage media. Reducing the amount of data that needs to be transmitted across the network, especially to the cloud, can increase backup speeds and save storage costs.
Although new approaches to achieving data deduplication are continually being developed, here are the basic methods.
Many of us have dozens of online accounts including social networks, email, shopping, and work. Each account requires its own password for authentication along with a user name. The problem is that no one can remember so many passwords and user names, so there is a tendency to re-use them. Continue reading
The proliferation of IoT (Internet of Things) devices offer numerous benefits for consumers when they plug devices such as cameras, light bulbs, thermostats, digital video recorders, refrigerators and other household items into the Internet. It is estimated that billions of IoT devices are in operation right now and their use is growing by leaps and bounds.
The lack of adequate security measures in these devices, however, poses serious risks to users and the greater Internet community. This is because vulnerabilities in IoT devices come from several sources:
According to a recent report by Forrester, the cloud computing market will enter a phase of accelerated growth in 2017. This growth is being fueled by the need of companies to power their core business systems in addition to their customer-facing applications.
Key trends highlighted in the Forrester report include…
Passwords are no longer a sufficient means of controlling access to sensitive data, so the Payment Card Industry Security Standards Council (PCI SSC) is doing something about it. They are now recommending that organizations bolster access security with multi-factor authentication.
Why all the fuss?