<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=162429800880729&amp;ev=PageView&amp;noscript=1">

The Tech Break

Technology Assessment

Let Bird Rock Systems' team of experts help you discover the possibilities for your business and IT team with an assessment.
Secure Your Data Today

Welcome to The Tech Break!

Jul 25, 2012 / by Joseph Javien posted in In The News, IT, Bird Rock Systems

 

What is The Tech Break? 

The Tech Break is a Bird Rock Systems technology blog site. We know that, working in IT, it can be challenging to break away from the daily fires and projects, but when you do have free time, thetechbreak.com is a great place to learn about technologies, best practices and get the latest tech news. In addition, we encourage you to participate and contribute to our community of technology professionals by posting comments on our discussions.


Who is Bird Rock Systems?

Bird Rock Systems is an award winning San Diego, California based technology solutions provider.

 

What kind of technologies will you talk about on thetechbreak.com?

This website is dedicated to datacenter technologies for medium to enterprise businesses in the areas of:

 

-          Security

-          IP Communications

-          Network Infrastructure

-          Wireless

-          Network Management

-          Storage

-          Performance Computing (Servers)

-          Virtualization

-          Racks, cooling and power protection

-          IT Design and Engineering

 

 

What kind of topics can I expect from this site?

There's a lot of technology information on the web, from the latest IT solutions to the most recent security breaches; buzz words like cloud computing and virtualization. We steer clear of the marketing and focus on what’s most important, the technology.

 

In this blog we will share what we see as useful information for IT professionals based on the feedback from our customers. Our goal is to provide information that will make your job easier and help you solve problems and in turn will save you time and money.

 

Discussions coming soon…

Deconstructing Security Breaches and How Not to be an Easy Target

Tips and Guides for Configuring Next Generation Security

How to plan for a storage/virtualization/backup project

Attack of BYOD (Bring Your Own Device): The Management Challenges and Security Vulnerability it Posses to Your Organization

5 Things Every IT Person Must Know About Modern Malware Threats

 

Thetechbreak.com is an opportunity for us to give back to the IT community and provide a forum where we address real world IT challenges and how to solve them. To receive regular updates, please subscribe to our RSS feed.

 

If you would like more information about Bird Rock Systems visit http://www.birdrockusa.com/ .

Thanks for stopping by!

Read More

SD Business Journal: Down the Dark Alleys of Data

Jun 25, 2012 / by Joseph Javien posted in In The News, Jim Matteo, Security

In an interview with the San Diego Business Journal, CEO of Bird Rock Systems Jim Mateo breaks down the first steps on how to protect your company data. When looking into the access and security of confidential data, especially sensitive data, he says that security and access may call for “two-factor authentication,” requiring a person to submit two forms of proof that they have permission to look at the data. This might be a password coupled with biometric information such as the user’s fingerprint.

Matteo displays a different security device used in two-factor authentication: A plastic token about the size of a house key. The device, from EMC Corp. subsidiary RSA, contains a liquid crystal display which shows a code number. The number changes every 60 seconds according to a mathematical pattern. To gain access to sensitive information, a computer user might key in their personal password as well as the number from the SecurID device.

Mateo continues on to talk about how to employ basic security techniques by describing how businesses need appropriate electronics, such as a firewall or a universal threat management device, to make it harder for hackers to get in.

“Next generation firewalls that are application aware are a great tool for businesses of all sizes,” Matteo said. These might uncover software that a computer owner was previously unaware of its presence.

For the full story visit: http://www.sdbj.com/news/2012/jun/25/down-dark-alleys-data/?page=2

Read More

Posts by Topic

see all