AI..EI..OH!

AI..EI..OH! Riverbank Ruminations; Observations from The Banks of The Technology River Tom Evans ~  Ashton Engineer Emeritus AI (Artificial Intelligence) is everywhere these days. What comes to your mind when AI is mentioned, Skynet, Alexa, advanced medical diagnoses? Varying degrees of artificial learning/decision making are going on all the time and we are mostly unaware […]

Amnesia and Normalcy

Amnesia and Normalcy Riverbank Ruminations; Observations from The Banks of The Technology River Tom Evans ~  Ashton Engineer Emeritus   I mentioned this article on Wikipedia in an earlier blog. The idea of landscape amnesia mentioned that there is an interesting one to apply to the world of technology. Landscape amnesia refers to changes that […]

Your Employees are Your Biggest Cybersecurity Threat

Your Employees are Your Biggest Cybersecurity Threat When it comes to cybersecurity, businesses have a lot to worry about, with the costs associated with protecting a network (or responding to failed attempts to protect your network) dominating these costs. While it is incredibly important to protect your business in any way possible, it is often […]

When Is a Combination Lock Not a Combination Lock?

When Is a Combination Lock Not a Combination Lock? Riverbank Ruminations; Observations from The Banks of The Technology River Tom Evans ~  Ashton Engineer Emeritus Sometimes you think you know something and you have known it for a long time and you find out it is wrong. Sometimes it is very wrong, like when they […]

Five Reasonable Ways to Maximize Data Security

Five Reasonable Ways to Maximize Data Security By David Myers Data Privacy and Cyber Security Partner Buckingham, Doolittle & Burroughs, LLC (Provided in cooperation with Ashton Solutions and Sophos)   As a small- to medium-size business owner, have you ever thought about what’s involved in protecting your business from a security breach? You may even […]

Ashton Solutions Response to Log4J Threat

Ashton Solutions Response to Log4J Threat The following email was sent to all Ashton clients on December 14, 2021 PLEASE READ THIS CAREFULLY, IN ITS ENTIRETY. This is an urgent security bulletin about the Log4Shell security vulnerability making headlines this week.  Ashton Technology Solutions has been monitoring the situation and would like to update you […]

Are Your Smart Speakers Always Listening?

Are Your Smart Speakers Always Listening? Many people use smart speakers throughout their day-to-day lives, whether it’s as a personal assistant or to control their home entertainment system. However, one of the topics up for discussion is how secure these devices actually are and whether or not we should be concerned about them. Just how […]

Identifying Errors in Phishing Emails can Save Your Bacon

Identifying Errors in Phishing Emails can Save Your Bacon Phishing scams have been around for a long time, and they have only grown more convincing and more dangerous. Some businesses can’t even tell the difference between phishing scams and legitimate messages! How can your organization take the fight to phishing emails? It all starts with […]

U.S. Government Taking Steps Toward Protecting Data

U.S. Government Taking Steps Toward Protecting Data Do you remember the series of high-profile infrastructure attacks that occurred not so long ago this year? Well, now the United States government is taking matters into its own hands by ordering the patching of various vulnerabilities in affected systems. It’s a massive effort to thwart hackers and […]

Will Your Insurance Carrier Require Multi-Factor Authentication for Cyber Insurance?

Will Your Insurance Carrier Require Multi-Factor Authentication for Cyber Insurance? Are you getting ready to renew your cyber liability insurance policy?  Maybe you’re looking to increase your limits due to the continued increase in attacks and the cost of those attacks.  Or maybe you’re finally getting around to applying for coverage for the first time. […]