Ravi Das

Ravi Das
53 POSTS0 COMMENTS
Ravi is a Business Development Specialist for The AST Cybersecurity Group, a leading security consultancy based in the Greater Chicago area. It is a boutique firm, offering all sorts of cyber services, including that of technical writing and podcasting. The AST Cybersecurity Group has been in business for 11 years, and the website is: www.astcybsersecurity.com

How to increase remote workforce productivity

Introduction Given the COVID-19 that the word is facing today, many businesses, large and small, have been scrambling literally around the clock in order to...

Part 2: Security risks of 5G

Risks associated with 5G Some of the main concerns with 5G are as follows (continued from last article): The use of Artificial Intelligence (AI): AI is now...

Security risks of 5G

All the wireless network connections that take place today use that of the 4th Generation (4G) technology. The first versions of this were deployed...

Part 2: The top tax scams in 2020

In Part 2 of this series, we continue with the remaining tax scams. Click here to read Part 1. The cancellation of your Social Security...

Part 1: The top tax scams in 2020

Introduction As we get closer to 15 October, this can mean only thing that most Americans hate doing: paying taxes (of course, if you are...

Part 2: Cybersecurity risks of social media

In this article, we continue with the theme of examining the threat vectors that are posed to social media platforms. Read Part 1 of...

Part 1: Cybersecurity risks of social media

When one thinks of a cyberattack, very often, the image of a hacker going after servers and databases in order to gain the Personal...

Other threats to The Cloud

The malicious insider Cyber security threats to the Cloud Infrastructure can transpire from both within outside of and businesses, corporations, and organisations. In fact, according...

The types of malware injection attacks

Introduction The cloud computing infrastructure is susceptible to malware injection attacks. In these instances, the cyber attacker creates a malicious application and injects it into...

Part 2: The need for endpoint security

Our last article examined the need for endpoint security, and some of the best practices that are involved. In this article, we continue with...