Bluetek IT Solutions Blog

Bluetek IT Solutions has been serving the Pennsylvania area since 2005, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

How Data Literate Is Your Company?

We have all read stories of facial recognition software that fails to recognize dark-skinned faces, or robo-loan officers that deny mortgages to certain groups. As a growing body of research has made clear, algorithms created by non-representative groups have resulted in AI that perpetuates the inequities already prevalent in our society. As more companies rely more heavily on data and AI, these problems of algorithmic discrimination may only become worse.

Most companies know this by now. What they’re trying to figure out is: how can they avoid becoming yet another bad example?

The short answer is, thinking critically about the data you’re collecting and how you’re using it needs to be everyone’s job. Expanding the circle of who is in the room helping to question, build, and monitor algorithms is the only way that we will develop responsible AI. Doing that work requires data literacy — the ability to parse and organize complex data, interpret and summarize information, develop predictions, or appreciate the ethical implications of algorithms. Like math, it can be learned in beginner and advanced modes, spans multiple disciplines, and is often more practical than academic.

Continue reading

How To Develop A Disaster Data Recovery Plan

Data is one of the most important assets for many organizations. A significant level of care should be given to prevent data security incidents. However, despite the best plans and intentions, both man-made and natural disasters can occur at any time. The best course of action is to prepare in advance, ensuring that your enterprise has a well-developed disaster recovery plan in place to deal with potential occurrences.

The best disaster recovery plans are prepared with a logical knowledge of your environment. An organization that thoroughly evaluates possible threats, vulnerabilities and probabilities of a disaster can help ensure a more cohesive and cost-effective recovery plan. 

To get started, you should identify the critical assets that you'll need to protect in the case of a disaster. The corresponding vulnerabilities and potential threats should be assessed and preferably quantified. Based on the probability of a disaster occurring, the risk can be quantified as well. Then, your organization can build a recovery plan that prioritizes assets that meet a calculated risk threshold. Note that data recovery is the primary asset for most information security disaster planning, so make it a priority. 

Continue reading

The Passwordless Future is Here for Your Microsoft Account

Nobody likes passwords. They’re inconvenient. They’re a prime target for attacks. Yet for years they’ve been the most important layer of security for everything in our digital lives—from email to bank accounts, shopping carts to video games.

We are expected to create complex and unique passwords, remember them, and change them frequently, but nobody likes doing that either. In a recent Microsoft Twitter poll, one in five people reported they would rather accidentally “reply all”—which can be monumentally embarrassing—than reset a password.

But what alternative do we have?

For the past couple of years, we’ve been saying that the future is passwordless, and today I am excited to announce the next step in that vision. In March 2021, we announced that passwordless sign in was generally available for commercial users, bringing the feature to enterprise organizations around the world.

Beginning today, you can now completely remove the password from your Microsoft account. Use the Microsoft Authenticator app, Windows Hello, a security key, or a verification code sent to your phone or email to sign in to your favorite apps and services, such as Microsoft Outlook, Microsoft OneDrive, Microsoft Family Safety, and more.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

2022
February
March
April
May
June
July
August
September
October
November
December
2021
January
February
March
April
May
June
July
August
2020
January
February
March
April
May
June
July
August
September
October
November
December
2019
January
February
March
April
May
June
July
August
September
October
November
December
2018
January
February
March
April
May
June
July
August
September
October
December