
Homomorphic Encryption and Privacy
Encryption is used to protect everything sensitive, including website accounts, emails, video conferencing, health records, and all sorts of data transmitted over the internet. We touched on some of the
Online Voting and Cybersecurity
The COVID-19 pandemic is a significant obstacle to participation in U.S. elections, especially the upcoming general election. Online voting could potentially minimize the spread of the coronavirus and allow citizens
IT Asset Management and Cybersecurity
Most organizations rely on IT assets for their day-to-day business operations. IT assets can include the hardware, software, and data used for work. However, organizations may need to inspect their
Backup Operations and Strategies, Part 2
This is the second article of a two-part series about operations and strategies for making backups. Backups are duplicates of important data necessary for one’s business or personal life. The
Backup Operations and Strategies, Part 1
The data stored within your computer or server can be worth as much as (or more than) the hardware itself. However, access to data should never be taken for granted.
Virtual Private Networks and Cybersecurity
If you work remotely, you might use a Virtual Private Network (VPN). If you don’t use a VPN, you might’ve at least seen this term before. When you use a
COBOL and the CARES Act
The Coronavirus Aid, Relief, and Economic Security (CARES) Act was introduced to assist Americans affected by the economic fallout of the COVID-19 pandemic. According to Ian King of Bloomberg, this
Blockchain: The Mathematics Behind the Basics
After reading our previous blog post, you might understand what cryptocurrencies are and what blockchain technology is. However, you might also want to know about the basics of how they
Blockchain: A Basic Overview
“Blockchain” is a term you may regularly encounter when reading news articles or exploring new business prospects. For example, in 2017, Timothy B. Lee of Ars Technica reported about an