Blog

Pendello Solutions Pendello Solutions

Yubikey: Even More Security!

The increasing risk of data breaches continues to be the trend, and multifactor authentication is no longer the exception, it is the expectation. Multifactor authentication has proven to be the soundest way to ensure the security of data; unfortunately, this process is known to be a hassle. Yubikey is changing this perception.

Read More
Pendello Solutions Pendello Solutions

The Dell Latitude 7400 Is A Double Hitter

The new Dell 2-in-1 Laptop, announced at CES 2019, is a true multitasker. Not only is it the smallest commercial 14-in. 2-in-1 laptop (offering great portability) but it also packs some serious security punch. This laptop has hit the mark taking a bit of the bother out of security by including Intel’s Proximity Sensor Technology.

Read More
Pendello Solutions Pendello Solutions

Pendello's Top 3 CES 2019 Announcements

The CES global stage has been the meeting place for all things new and innovative for over 50 years. Themes this year are Smart Homes, 5G, AI and massive TVs and monitors. As of today, the following are Pendello’s top three spotlights on new technology that we are excited about.

Read More
Pendello Solutions Pendello Solutions

The Internet Of Things: What Is It And How Does It Impact You?

What exactly is the Internet of Things (IoT)? In the simplest of terms, it is the interconnection of devices which allows them to communicate and collect data fully. When we think of connecting devices, we typically think of our smartphones, computers, and TVs but the IoT goes way beyond this.

Read More
Pendello Solutions Pendello Solutions

Why Annoying Password Aren’T Really Annoying

Pendello Solution’s Minimum Password Standards:

-12 characters

-Utilize a phrase

-Ensure your Email password is different than all other accounts

-Make sure your password is not a common password (e.g., Password1, P@$$word!

Read More
Pendello Solutions Pendello Solutions

Apple Announced A Few New Players

Last week, Apple held its hardware event where they announced their Mac and iPad news. As always, Apple’s releases are exciting, and a few heavily requested updates were met! The announcement included a New and Improved Mac Book Air, the return of the Mac Mini and an iPad Pro.

Read More
Pendello Solutions Pendello Solutions

Smart They Are, But How Safe Are Smart Homes?

Hackers are targeting Smart Homes because they are easy targets! Through a study, researchers found how simple and vulnerable some of these smart devices were and were able to compromise many within 30 minutes and some even with a simple google search! How do you keep your home safe?

Read More
Pendello Solutions Pendello Solutions

Top 5 Take-Aways From Microsoft Ignite

Microsoft Ignite, the infamous Microsoft Conference which gathers over 30,000 attendees and announces incredible news was held once again in Orlando, Florida. There was so much news that all press received a 27-page booklet detailing all announcements.

Read More
Pendello Solutions Pendello Solutions

Just In Time For Apple Picking: Ios 12

Apple had released massive changes to their operating system. This update is one of logic and usefulness. The changes, in fact, have not only been suitable for the new devices but also seem to be great improvements to the older technology as well.

Read More
Pendello Solutions Pendello Solutions

Small Business Technology ABC’s

The must-have business technologies. Being a secure and efficient business can be as easy as 1,2,3 as long as you follow these ABCs of business technology.

Read More
Pendello Solutions Pendello Solutions

Keylogging Uncovered.

Keylogging is one of today’s modern cyber-crimes but has the same basis as ancient spies.

A Keylogger is a type of software or device that acts as surveillance tracking mechanisms.

This is how cybercriminals steal banking information, credit card numbers and gaming information.

Read More
Pendello Solutions Pendello Solutions

And The Password Is…

August 17, 2017, NIST released their guidelines for password management. The guidelines are as follows:

• Remove periodic password change requirements

• The algorithmic complexity is no longer necessary

• Require screening of new passwords against lists of commonly used or compromised passwords

Read More