Deep Web & Dark Web basics

Occassionally we get asked about the deep web and dark web. They are two very different places. Norton by Symantec has done a good job of explaining the differences as well as talk about the basics.

Believe it or not, accessing the deep web is easier than you think. In fact, you probably already have. The media hasn’t done a great job of differentiating what’s considered the deep web and what is the dark web — two similar names for two very different things.

What is the deep web? 

The deep web is just like it sounds — below the surface and not completely dark.

Search engines like Google, Bing, and Yahoo are able to search and index websites because of links. They use links to rank search results according to things like relevancy, inbound links, and keywords. Browsers search the so-called “surface web,” but that’s where the search stops.


Predictions of future office environments

It’s truly challenging to keep up.  More is changing in the world of technology than is remaining the same. Our friends at HP (think mainstream computing, rather than bleeding edge companies) takes a look at wearables, what’s going to happen to your office (think of a rudimentary holodeck) AI assistants and translators.  Hang on – it’s going to be quite a ride!

Wild things are coming your way

There’s so much changing in the IT world at this very moment—from transitioning to Device as a Service to managing the security of an increasingly mobile workforce—that it’s hard to look beyond next month, much less the next decade. So we did it for you. (You’re welcome.) Here are five burgeoning technologies that we think will radically change the way you work.

HR-monitored wearables

The idea: Not feeling well? Don’t worry about calling in sick—HR will do it for you. The office of the future will use a Device-as-a-Service model that includes wearable tech that your company will use to keep tabs on your health. It could be as simple as a smart watch or as sophisticated as “earables”—in-ear devices that can monitor temperature and heart rate as part of their wide range of features.


Empowering your remote workforce

You probably know at least a few friends working from home these days. The trend is on the upswing, despite what headlines about companies pulling employees back into the office may suggest. Survey guru Gallup swizzled the numbers and found 43 percent of American workers were already part of the remote workforce, a number expected to hit 50 percent by 2020.

It’s thanks to mobile office technology that this swing toward offices without borders is even happening. Former desk jockeys are tapping into smartphones and laptops to access email, group chat apps, remote printing, instant messaging, screen and file sharing, videoconferencing, and VPNs—all from their kitchen tables or their beach houses.


Spam, Spam - Go Away

used with permission from Norton by Symantec

Spam. In some ways, it's the electronic equivalent of junk mail and junk phone calls. Spam is not only an unsolicited and annoying nuisance, it's also a pervasive problem that's clogging and overwhelming the Internet's email systems. Spam accounts for approximately 80 percent of worldwide email volume.

In other ways, spam is worse than junk mail or junk phone calls. Although some spam is simply unwanted but legitimate advertising, much of it is worse. It can include everything from scam offers to malicious code--all designed to wreak havoc on your financial well-being or on your computer. Here are some of the most current and prevalent spam threats:


Playing - The Old Computer Hardware Blues

Unlike fine wine, your cyber assets don’t get better with age. Any PC more than four years old is not only costly to keep, but it’s also hack-friendly tech that could pose serious office security risk. Old PCs lack the built-in security triggers needed to repel the thousands of malware threats discovered each hour. With new technology, you could avoid 70–80 percent of the top malware detected.

Down-level hardware could potentially jeopardize your business—and that risk carries a price tag far exceeding an investment in state-of-the-art technology. As Two River Community Bank put it, “The risk just isn’t worth it.” There’s no reason to stick with outdated hardware, especially when computing power is growing exponentially and faster than ever. Older hardware may be costing you precious time, and the longer you delay updating old equipment, the further behind you’ll fall in the skills, knowledge, and technology needed to compete with companies on top of the curve.

Leverage the benefits of more secure hardware

With cybercrime raging over the internet, security best practices demand powerful, security-hardened computers providing:

  • Hardware-enforced, self-healing protection that keeps critical applications and processes running even if malware tries to shut them down
  • Strong identification protocols, including biometrics
  • Privacy screens shielding sensitive information from coffee-shop snoops
  • Advanced features that protect firmware; auto-recover the BIOS from malware, rootkits, and corruption; guard critical OS processes, and keep web-based attacks locked inside an isolated browser tab

Establish floor-to-ceiling security

Cybercrime aside, businesses face many other dangers. A comprehensive office security plan must account for everything from computer theft and bad wiring to earthquakes and terrorist attacks. Physical theft can strike companies of all sizes. You can minimize the likelihood of disappearing assets with low-tech solutions, such as guards, key locks, and invisible tagging to track and retrieve items. Larger-scale operations may require elaborate alarm systems, cameras, or motion sensors. In the event your tech does get stolen, you should employ encryption and remote-wiping capabilities on all your hardware, though many newer devices come with these features built in.

While you can work to stop hackers and theft, there isn’t too much you can do against mother nature. Floods, fires, and other disasters may not be common, but when they happen, they can easily cripple businesses. The same is true for hardware failure, which is a higher risk when you’re using old hardware (see a trend?). That’s why disaster recovery and remote backups are a must for office security that covers all your bases.

Whatever safeguards you choose, the most crucial piece of on-site security is staff awareness and buy-in. Launch a security campaign that includes tips, posters, meetings, and contests. The more you promote physical security best practices, the better the chances your users will take care of their equipment.

Turn to the digital fittest to survive

All aspects of the IT culture—hardware, software, browsers, physical space, etc.—sit in the eye of a hurricane, with changes swirling about furiously fueled by faster, more powerful technology. The exponential rate of change and innovation will have a profound impact on every business operation, and office security will be a huge component of “survival-of-the-digital-fittest” culture.

To keep pace, make sure you try your best to understand megatrends that may affect your business, adopt breakthrough technologies early, and set an aggressive schedule for replacing your IT assets with more secure hardware to meet the needs of all your stakeholders.

Previous Entries / More Entries