An IT MSP serving Small/Medium businesses in the Caribbean, as a full IT department or a supplemental support team.

About Dwight D.

This author has not yet filled in any details.
So far Dwight D. has created 5 blog entries.

Byline: What is Next for Cloud Services in the Federal Space?

Historically, federal agencies have been wary of using public cloud due to security concerns. Yet the agility and cost savings offered by cloud infrastructure is proving to be a major incentive, leading to a recent big push for agencies to re-engage with public cloud providers. Security is still a central issue, and many agencies [...]

By | 2017-05-30T07:51:22+00:00 May 30th, 2017|Technology Trends|0 Comments

Cloak & Dagger is a newly-discovered Android exploit that lets hackers hide malicious activity

Researchers from Georgia Institute of Technology have released a full report on a new attack vector that affects Android up to version 7.1.2. The exploit, called Cloak & Dagger, uses Android’s design and screen behaviors against users, effectively hiding activity behind various app-generated interface elements that lets a hacker grab screen interactions and hide [...]

By | 2017-05-25T11:22:56+00:00 May 25th, 2017|Cyber Security|0 Comments

Cisco IoT Threat Defense: Securing the IoT at Scale

This is repost from Cisco, originally written by Marc Blackmer Protect Vital Services in Advanced Medical Care, Automated Manufacturing, and Power Generation and Delivery From time to time, I find it’s helpful to pause and take stock of why I do what I do. Recently, I found myself talking with a CEO of [...]

By | 2017-05-23T13:38:21+00:00 May 23rd, 2017|Cyber Security|0 Comments

Perspective: The Aftermath of the WannaCry Attack

This is a repost from Fortinet that I think makes for an interesting read. The original post was written by Bill McGee on May 18, 2017. A perspective blog with Derek Manky, Global Security Strategist, Fortinet. We asked Derek to put WannaCry into context. Is this just the eye of the storm? [...]

By | 2017-05-21T19:40:16+00:00 May 21st, 2017|Cyber Security|0 Comments