A Networkworld article on ‘CEO Fraud Prevention’ notes that Spear Phishing is a much more focused form of phishing because the cybercriminal is familiar with the user or groups. Either from having studied up on the group or has gleaned data from social media sites to con users. From the gleaned data, the cybercriminal personalizes…Details
2016 was the year of the Brexit vote, the Rio Olympics, and the US presidential election. It was also the year of ransomware. Throughout 2016, we watched ransomware grow in popularity, frequency, and effectiveness. We also observed the introduction of ransomware-as-a-service, where people with few technical skills were able to franchise ransomware. The entities acquired…Details
Yahoo Hacking So, more than a billion Yahoo user accounts got hacked through December 2016. This time round bigger than the previous one. Hackers are getting bolder and bolder with some of being state influenced. Like the now confirmed meddling by Russia in the November 2016 US election. As Kenyans near the August 2017 election, Independent Electoral and…Details
Ransomware increase in 2016 Symantec’s 2016 security report indicates an average of 4,000 ransomware attacks in 2016 worldwide. And it’s a 35% increase from 2015. The ransomware developers have figured that by encrypting then holding someone’s data hostage is the safest way of making quick money. Not to praise them, but it sure is classier and…Details
Cost One aspect that stands out about virtualization is the fact that it provides organizations a self-contained environment. Moreover this environment is safe to carry out development without disrupting their main working environment. It’s more cost effective as companies don’t require to get extra hardware to manage and store different types of data.Details
Storage consumption Data archiving protect older information that is not needed for everyday operations. Additionally, the data may have to be accessed occasionally. The data archives serve as a way of reducing primary storage consumption and related costs, rather than acting as a data recovery mechanism. Comztech has met the certification requirements for Veritas Enterprise…Details
Comztech, a VERITAS partner offers the solution to show business’ growth. This is done in a singular view of data and that gives control of all data stored on different platforms in a cheap and efficient manner.
In an nutshell, data warehousing is collecting and maintaining business live data. The data is Extracted, transformed and Loaded from the active databases to a repository. Then the collected data is integrated to aid in making reports and dashboards for different users. And at Comztech we have IBM infosphere and DB2 certifications the most reliable…Details