https://macguyvertech.com/wp-content/uploads/2022/01/pexels-pavel-danilyuk-8438868-1280x640.jpg

Artificial Intelligence (AI) has arrived, and will be a major factor in our lives, very soon. We’ve already experienced some form of it; a shopping assistant on your favorite website, a banking program that recognizes suspicious activity, or even an article that pops up when you run an Internet search for “Top Kitchen Remodelers in Dubuque, Iowa,” It’s taken a foothold in our lives, and we’ve barely noticed. Should this alarm you? Probably not, or...

https://macguyvertech.com/wp-content/uploads/2021/01/Depositphotos_304761994_l-2015-1280x640.jpg

As blockchain technology and cryptocurrencies continue to rapidly develop and gain popularity, their potential uses and applications in the professional world have taken center-stage. More specifically, the appearance of smart contracts, computer programs that perform a task when triggered by the occurrence of a predetermined event, have become one of the most attractive uses of this new technology.   These smart contracts are particularly useful in supply chains, as they are effective for sending payments, recording ledger entries, and flagging events that require...

https://macguyvertech.com/wp-content/uploads/2021/06/Security-Blog--scaled-e1623255318650-1280x640.jpg

Cybersecurity has been a topic that has been pushed to the back of a lot of executive’s minds. Often times the only time you would care about cybersecurity is only after becoming a victim. While this approach may have worked in the past, the last 6 weeks have proven that it is time to take an active role in your companies cyber resiliency. Hackers are becoming bolder with each attack and as a result the...

https://macguyvertech.com/wp-content/uploads/2021/01/Depositphotos_144711645_l-2015-1280x640.jpg

If you paid any attention to the national news in recent weeks, you would have seen the coverage of the Colonial Pipeline attack. A quick refresher, a devastating ransomware attack that brought operations of a major gas pipeline to a halt. Ransomware is usually installed thru the method many have heard of phishing. Phishing is a very common cyber-attack but there are three different types of phishing attacks. There is spear phishing where attackers target...

https://macguyvertech.com/wp-content/uploads/2020/09/macguyvertech.com_software_userexperience_blog_cyber_insurance.jpg

Cryptocurrencies have been an extremely hot topic on social media with people constantly engaging in the growing market. One of the key aspects of the crypto world is the fact that it is always changing and evolving. In the past on this blog, we have talked about Cardano ($ADA) and how it could be the next coin to take off. Well since that blog Cardano has become hotter in the street. An interesting thing that...