While small businesses and their employees have certainly benefitted from the advancement of technology in recent years, it has also introduced an unprecedented number of cybersecurity risks. Ransomware attacks, for example, hit businesses every 11 seconds in 2021,1...
According to Statista data, the global blockchain technology market share by use case in 2021 was distributed as follows; cross-border payments and settlements (15.9 percent), lot lineage and provenance (10.7 percent), trade finance and post-trade (10 percent),...
It is no secret that technology is changing almost every aspect of our lives, from travel, our health, to how we experience things. Now it is influencing the way we communicate with companies. The customer service industry is changing because of computer science...
An eSIM, also known as an embedded SIM, is a virtual SIM card that can be used in place of a real SIM card in a smartphone. It’s a non-removable programmable Subscriber Identity Module (SIM) soldered to the phone’s internal circuitry. You can, however,...
Briefing on the Colonial Pipeline Attack Below is background and known details of how the pipeline attack was executed, as well as some recommended mitigation tactics for organizations looking to cover their bases. Background The Colonial Pipeline attack, which shut...
One of the greatest problems DragonTech faces at times is having to deal with horrendous security breaches or taking on new customers who do not understand the necessity of having a high level of cybersecurity. A lack of good cybersecurity is a ticking timebomb that...