A Strong Password is Your First Defense

The evolution of computers is astounding.  The increase in computing power, bandwidth and accessibility has made almost everything people do with computers easier.  Information technology not only satisfies our need for instant gratification, but changes the rules for trivial pursuit. No doubt, computers have changed our lives, but we still login very much like in the old days. Today’s computer looks much different from the main frame days. Back then most users had a “green” screen to input data, starting with username and password. There was little graphics and most user input was entered at a prompt.  Now, the graphics are remarkable from backgrounds to programs to games.  The modern computer and display makes the virtual world come alive in ways that were hard to imagine twenty years ago.  But with all the advancements one key feature hasn’t changed, we still use a username and … [Read more...]

Living on the Edge with Your Data Backup and Disaster Recovery Strategy?

One of the biggest risks you can take is not having a backup and disaster recovery strategy. Your data is important and irreplaceable.  Sure, you may never experience a disk failure, but if you do it will be a disaster.  Ask anyone who has suffered a data loss and they will tell you about the distress and panic when they realized that the data was gone forever.  Data loss can devastate your operations and cripple your organization.  But for a problem with such disastrous results, it has an easy fix. Read about our easy 3-2-1 Backup Strategy. Backing up data is relatively easy and economical on the front side and provides an easy recovery method in case of a disk loss or failure.  Backup costs are a fraction of recovery costs and sometimes no amount of money or effort can recover data from a severely damaged disk. Today’s technology provides many cost-effective ways to protect … [Read more...]

Honeypots and SCADA Systems

Guest Blog by Rusty O’Neal System Specialist/SCADA Admin, Canoochee EMC and Secretary, GEMC Distribution Transmission Automation Group (DTAG) "A honeypot consists in an environment where vulnerabilities have been deliberately introduced in order to observe intrusions and attacks"(Pouget & Dacier, 2004, p. 2). The great thing about honeypots is that you can put them into any environment to observe malicious traffic. This could be used to monitor traffic locally or a wide area. Honeypots have been used for over twenty years now to watch for such traffic. The great thing about using a honeypot is that it is used to set a trap to detect, deflect, and in some manner counteract unauthorized access. A honeypot looks just like any other network including computers, data, and a network site that appears to be part of the corporate network, but is actually put in place to be closely … [Read more...]

Earth Day Electronics Recycling Event – April 20th

Please join us on Friday, April 20th from 11-2 for our Green IT Recycling event.  Bring your electronics to recycle.  Premier Surplus will have recycling bins and hard drive shredding will be offered at no charge. Enjoy lunch with us as we will be grilling hot dogs and brats. 3079 Crossing Park, Norcross, GA 30071 Proceeds from the recycled equipment will be donated to the Norcross Cluster School Partnership. For more information, call us at 770 662-0312. … [Read more...]

A Giant Leap for Quantum Computing

Today’s computers are the product of a digital revolution.  When we talk about computing, we talk about an environment of ones and zeroes that add up to all the programs, graphics and communications that we use. Often we tease, it’s just ones and zeroes but that small concept has enormous and far-reaching implications. In the early days of computers, there was a competition between analog and digital computing for a practical, supportable, calculating machine.  Actually, analog computers go back to ancient times and were used to calculate the position of stars and planets.  Probably the most familiar example of an analog computer is a slide rule. But as analog slide rules were replaced by digital calculators so were analog computers replaced by its digital competitor. Analog computers are powerful because they have multiple states and are not constrained by just ones and zeroes.  They … [Read more...]