TrainACE - IT and Cybersecurity Training Blog

The Easiest Ways to Make Your Public Wi-Fi Connection Safer

[fa icon="calendar'] Jul 15, 2015 2:27:01 PM / by Ariana Ciancio posted in Cisco, Cybersecurity

[fa icon="comment"] 0 Comments

If you think public Wi-Fi is 100% safe, your personal information is already at risk of being stolen. Whenever you connect to a public wireless router, you’re sharing the same network as others even if it is password protected. It’s relatively simple for someone to see what you’re doing and take your data if they’re connected to the network you’re on. Fortunately, you can take some steps to safeguard your personal information.

Read More [fa icon="long-arrow-right"]

5 Cyber Security Guidelines for Vacationers

[fa icon="calendar'] Jun 26, 2015 10:28:43 AM / by Ariana Ciancio posted in Cisco, Cybersecurity, Hacking, mobile security

[fa icon="comment"] 0 Comments

It's that time of year...vacation season! Residents across the Washington, D.C. metro area are traveling to the many beaches and resorts just a day trip away! For most people, smart phones, tablets, and laptops play a huge role in everyday life, and even more so for those in the technology industry. Nonetheless, summer vacation is no excuse for travelers to neglect their cyber security. In fact, data thieves are more likely to strike when you are most relaxed and in places where people tend to let their guard down.

Read More [fa icon="long-arrow-right"]

What is Big Data and Why is It So Important?

[fa icon="calendar'] Sep 24, 2014 9:05:23 AM / by The TrainACE Team posted in Big Data, Cisco

[fa icon="comment"] 0 Comments

Big data consists of immense pools of information that can be analyzed to unlock patterns---all for the purpose of making better decisions. This data is the basis for growth and competition for companies. On a macro scale, it can enhance and create value for the world economy. The direct result is that the quality of services and products will increase. Until recently, the immense volume of data flooding the world excited a select few. Now however, big data is now at an inflection point where it is economically relevant for government agencies, business and consumers to mine this data for insights. The reality of big data is very similar to former IT investment trends as well as innovation and its apparent impact on productivity. In short, those who supply big data are expected to have as much impact on productivity as those who supply other kinds of technology. Additionally, these companies must make sure their employees complete comprehensive big data training to prevent the mishandling of highly sensitive information.

Read More [fa icon="long-arrow-right"]

The Importance of Mobile Security

[fa icon="calendar'] Sep 16, 2014 8:00:02 AM / by The TrainACE Team posted in Cisco, mobile security

[fa icon="comment"] 0 Comments

Reports on security breaches have now become standard in the daily news, as common as home or retail store robberies. Internet hackers steal personal banking information as simply as if they were reaching into someone's back pocket. However, security breaches are not limited to Internet transactions or computers. Mobile devices are now becoming targets for hackers to exploit user information.

Read More [fa icon="long-arrow-right"]

Open SSL, Being Patched Again?!

[fa icon="calendar'] Jun 9, 2014 9:15:50 AM / by Christian Crank posted in Cisco, Cybersecurity, Hacking, openssl

[fa icon="comment"] 1 Comment

hackingback

So OpenSSL is being patched again, very shortly after the Heartbleed Bug was fixed. According to the OpenSSL Security Advisory, multiple security vulnerabilities affecting the security layer have been recently discovered. One of the security threats actually allowed an attacker to see and modify traffic between an OpenSSL server and the client. While this news might seem bad, finding these vulnerabilities indicate that OpenSSL is frequently monitored by security professionals, and the appropriate steps are being followed to patch these vulnerabilities. This in turn makes OpenSSL a more secure implementation of the protocols SSL/TLS (Secure Socket Layer/Transport Layer Security).

Read More [fa icon="long-arrow-right"]

Microsoft Windows Security Essentials

[fa icon="calendar'] Mar 27, 2014 6:15:24 AM / by Christian Crank posted in Cisco, Cybersecurity, Microsoft, Uncategorized

[fa icon="comment"] 0 Comments

As the OS of choice for many businesses, Microsoft Windows houses the sensitive data of banks, hospitals and corporations. In fact, as one of the most prevalently used operating systems out there, malware authors have an affinity for attacking anything Windows—it’s their go-to playground.  In order to properly defend Windows security, you’ll need to configure a lot more than just a firewall. You’ll need a myriad of tools, techniques and tricks to outsmart the bad guys and protect your Windows system. But no worries: our Microsoft Windows Security Essentials course will teach you just that.

Read More [fa icon="long-arrow-right"]

Securing Web Applications

[fa icon="calendar'] Mar 18, 2014 4:50:13 PM / by Christian Crank posted in Cisco, Cybersecurity, Hacking, web application security

[fa icon="comment"] 0 Comments

While the Internet is an integral part of most organizations today, this widely used public network is also the source of data theft, cyber stalking and many other dangerous threats. Navigating the web safely can be particularly difficult---many cannot identify a threat before it strikes.

Read More [fa icon="long-arrow-right"]

Security+ Training Prerequisites

[fa icon="calendar'] Mar 12, 2014 11:30:37 AM / by alan posted in Cisco, CompTIA

[fa icon="comment"] 0 Comments

Security+ is a certification that can be acquired by people who want to get into a career in fields such as cyber security. There are a few different options such as working as freelance vendors in this industry or get a permanent job for a company who needs their computers and networks protected from hackers, viruses or any of the other things out there that can destroy an IT network. Once this certification is acquired, it will prove the individual has competency in the following skills:

Read More [fa icon="long-arrow-right"]

Hunting Cyber Threats with Big Data: Our Latest Webinar

[fa icon="calendar'] Feb 21, 2014 2:38:28 PM / by Katrina Lowe posted in Big Data, Cisco

[fa icon="comment"] 1 Comment

Alarmed by the number of major data breaches occurring lately?

Read More [fa icon="long-arrow-right"]

University of Maryland...Hacked and Exposed

[fa icon="calendar'] Feb 20, 2014 1:05:37 PM / by Christian Crank posted in Cisco

[fa icon="comment"] 0 Comments

 

Read More [fa icon="long-arrow-right"]

Need IT Certifications?
Want more info?

Call (301) 220-2802


or