Top Menu

Archive | Technology

What to do about WannaCry Ransomware

Ransomware works by infecting a computer, locking users out of the system (usually by encrypting the data on the hard drive), and then holding the decryption or other release key ransom until the victim pays a fee, usually in bitcoin. WannaCry is a fast-spreading ransomware that exploits a vulnerability in Server Message Block 1.0 (SMBv1). […]

Continue Reading
PA_PWP_YuMi

“You and Me” Collaborative Robot in York

For most people, when they hear the word “robot,” they immediately picture something in their mind. In many cases, it is a complex picture of expensive equipment surrounded by fencing/guards, safety devices, control panels and lots of wires. Today, technology along with product exists where that “robot” can work alongside of a human being eliminating […]

Continue Reading

Defense Contractor Cybersecurity Requirements

The Defense Federal Acquisition Regulations (DFAR) are changing for cyber security.  Below are the minimum cyber security requirements required by a company that is currently in the Defense supply chain. These requirements must be met by December 31, 2017 unless extended once again by the Defense department. If you are a Tier 1 supplier, it is […]

Continue Reading