Skip to main content

Posts

Showing posts from April, 2020

Automated testing

In software development, automated testing is a programmatic process for validating whether code meets the software development team's quality assurance (QA) requirements and functions as expected. Test automation tools use scripts to examine software code, report outcomes and compare results with earlier test runs. Depending upon the results, the software might be sent back to developers for more work, or it might be approved for deployment. Ideally, each script should only test one feature. If a test script checks multiple features, the developer will not know which part of the software failed. Automated testing tools run program code through an algorithm that has a start place, a change and an expected result. Automated scripts can follow every possible logic path in minutes and simulate almost any number of users. QA for a large application may take weeks to complete if done manually, but with automation, testing can often be completed in a day or less. On...

Ransomware recovery

Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking encrypted data. Having good data backups and a solid disaster recovery (DR) plan are the best ways an organization can recover successfully from this type of attack. With ransomware so prevalent, experts are urging businesses to assume that they will be hit with an attack, so protection and recovery are top of mind. Ransomware, a subset of malware, typically gets into a system when a user opens an infected email attachment or website. Several major attacks have recently made headlines across the world: WannaCry ransomware in May 2017 hit more than 100,000 organizations. The payment total was not high, considering the scale of the attack, but the downtime for organizations led to big losses. Petya in June 2017 was first detected in Ukraine government systems before spreading to organizations around the world. Bad Rabbit ransomware in O...

Remote Access

Remote access is the ability for an authorized person to access a computer or a network from a geographical distance through a network connection. Remote access enables users to connect to the systems they need when they are physically far away. This is especially important for employees who work at branch offices, are traveling or telecommute to work. Remote access enables remote users to access files and other system resources on any devices or servers that are connected to the network at any time, increasing employee productivity and enabling them to better collaborate with colleagues around the world. A remote access strategy also gives organizations the flexibility to hire the best talent regardless of location, remove silos and promote collaboration between teams, offices and locations. Technical support professionals also use remote access to connect to users' computers from remote locations to help them resolve issues with their systems or software. One comm...

Virtual assistant (AI assistant)

A virtual assistant, also called AI assistant or digital assistant, is an application program  that understands natural language voice commands and completes tasks for the user. Such tasks, historically performed by a personal assistant or secretary, include taking dictation, reading text or email messages aloud, looking up phone numbers, scheduling, placing phone calls and reminding the end user about appointments. Popular virtual assistants currently include Amazon Alexa, Apple's Siri, Google Assistant and Microsoft's Cortana -- the digital assistant built into Windows Phone 8.1 and Windows 10. Types of virtual assistants Though this definition focuses on the digital form of virtual assistants, the term virtual assistant, or virtual personal assistant, is also commonly used to describe contract workers who work from home doing administrative tasks typically performed by executive assistants or secretaries. Virtual assistants can also be contras...

Robocall

A robocall is an automated telephone call initiated by an autodialer for delivery of a prerecorded message. Robocalls are used for a wide variety of communications including public service announcements, appointment reminders, marketing, advertising, opinion polls and political campaigns. They’re also often used illegally for phone scams. Robocalls often enable interaction from the recipient, either through voice or keypad input or through transfer to an agent or representative. A scam robocall, for example, might involve a message congratulating the recipient on winning a cruise and requesting them to press 1 to speak to an operator. The term robocall derives from the fact that the call is completely automated, as if conducted by a robot.

Crisis communication

Crisis communication is a strategic approach to corresponding with people and organizations during a disruptive event. When a crisis occurs, proactive, quick and detailed communication is critical. Every business should have an emergency communication plan that documents the protocol for distributing information during a time of intense difficulty or danger.  Because a business' reputation is at stake when it faces a crisis, it's important to impart information to the public to ease concerns and counter false information. An outside public relations firm can help an organization interact with the media. However, if the organization resolves the crisis quickly enough, outside communication may not be necessary. As certain crises, such as cyberattacks have become more frequent, crisis communication strategies remain a key element of business continuity and disaster recovery. For better planning, an organization should assume it will experience a crisis. This includes on...

Phishing kit

A phishing kit is a collection of software tools that makes it easier for people with little or no technical skills to launch a phishing exploit. Phishing is a type of internet scam in which the perpetrator sends out spoofed e-mails or text messages that appear to come from a legitimate source. The goal is to trick the recipient into performing a specific action that will benefit the attacker -- typically, this involves getting the victim to click on a malicious link, open an infected attachment or authorize a transfer of funds. A phishing kit typically includes Web site development software that has a simple, low-code/no-code graphical user interface (GUI). This type of crimeware kit typically comes complete with email templates, graphics and sample scripts that can be used to create convincing imitations of legitimate correspondence. For an additional price, some kits may also include lists of e-mail addresses, telephone numbers and software for automating the malware distribu...

Digital workspace

A digital workspace is an integrated framework that facilitates the centralized management of end user computing (EUC) applications, data and endpoints. Vendors such as VMware, Microsoft and Citrix are unifying their portfolios of EUC products and marketing them as "digital workspaces," "unified workspaces" or "virtual workspaces."  Digital workspaces centralize end user resources and deliver the right resources to the right end user through a cloud-based console. A unified framework makes it easier for information technology (IT) administrators to deliver, manage and secure resources for end users, no matter what type of device they are using.  Digital workspaces are policy-driven. One of the central principles in establishing a perimeterless digital workplace is that the network alone does not determine which services a user can access. Instead, contextual data gathered from the device and the user's credentials dynamically determine th...