Check Out The New Emphy Platform Beta Version Walkthrough

Want to join Emphy as a beta tester? Click here to request early access on our official Emphy website. Once we distribute instructions to the Beta testing again, you’ll be able to test the platform…

Smartphone

独家优惠奖金 100% 高达 1 BTC + 180 免费旋转




Municipal IT challenges leading us down the path of innovation.

Security gives you the feeling of safety.

How secure is your Information Technology? What is Cyber Security? And is it used correctly to protect your information? Did the cities like Baltimore and Philadelphia have proper cyber security measures in place to prevent from having to have their information hi-jacked and held hostage for ransom.

Billions of taxpayer dollars have been spent paying for cyber security and the aftermath of ransom payments. The US government does not pay ransom for hostages. Why should these taxpayers?

Why did the security measures not work and why was the information not recoverable?

Let me put it in to perspective.

When buying a product most people don’t want to pay the price of handmade goods because its costly. So, they take the alternative and purchase something that was made with less than ideal means to simulate the same effect.

That’s what happens when most companies develop software and applications. Companies have their developers make cheap products, cut corners, and make mistakes to cut costs and build revenue.

Even after MILLIONS spent there is still is a requirement for a costly security program.

Security from 100% generated full source stacked code does ensure that every security protocol to date is followed to standard.

Think of a house.

When you move into a new home you would like to know that the doors and windows lock. If you purchase a security system, it should provide an extra layer of protection not the only layer of protection.

Don’t you want that first line of security and ensures that all doors and windows have locks and are locked, internal and external? Access to a home that is only authorized by the owner and their appointed security. A home with standard security measures that will change numbers and locations to all the rooms every time you access the main door.

Most developers are like builders whose homes have access points to rooms in the house that should not be there. This is a standard code violation however; it allows the builder to make the home faster and cheaper. Vulnerabilities are what hackers are looking for. So, if a security system is deactivated then the unlocked window can be entered, and the next thing you know all your valuables are taken, spy cameras have been installed, or yet your house is being held hostage for ransom.

Written by David I. Gonzales, Sr. PM VGIT Services Inc.

Add a comment

Related posts:

Confessions of a Female Technologist attending the Grace Hopper Celebration

From being the only women in tech in the room to one of 20,000 other female technologists. This was my experience attending the Grace Hopper Celebration.