(317) 522-1362 davek@cdsitconsulting.com
Are You Prepared For What’s Coming?

Are You Prepared For What’s Coming?

Cybercriminals Are Deploying Powerful AI-Powered Tools To Hack You – Are You Prepared For What’s Coming? An Arizona family was recently in the news warning others about how they were the target of a ransom call in which scammers used AI (artificial intelligence) to...

Facebook Lawsuit

Here’s a shocker: Facebook is being forced to pay a whopping $725 million in a settlement following a number of lawsuits claiming they violated users’ privacy. This is in addition to another class action lawsuit for $650 million for storing and collecting the...
Introducing the Microsoft Teams Schedule Send Feature

Introducing the Microsoft Teams Schedule Send Feature

Introducing the Microsoft Teams Schedule Send Feature Key Points Microsoft Teams will introduce a new feature in the coming weeks that will enable users to schedule messages to be sent later. Schedule Send will allow users to choose a specific time and date for their...
Small Business Guide To Microsoft Azure Virtual Desktop

Small Business Guide To Microsoft Azure Virtual Desktop

Small Business Guide To Microsoft Azure Virtual Desktop The business world is becoming increasingly digital. Since the COVID-19 pandemic began, many companies have moved into work-from-home situations, which has made remote and hybrid working environments more...
Cardiologist Turns Hacker

Cardiologist Turns Hacker

Cardiologist Turns Hacker – Moises Luis Zagala Gonzalez Moises Luis Zagala Gonzalez, a cardiologist in Venezuela, is the alleged creator behind the Jigsaw v.2 and Thanos ransomware strains. If true, this would make him one of the most prolific cyber criminals in...
6 Timely Tips To Help Businesses Avoid Phishing Emails

6 Timely Tips To Help Businesses Avoid Phishing Emails

6 Timely Tips To Help Businesses Avoid Phishing Emails Phishing emails are a common way for cybercriminals to steal important data from businesses and individuals. This article will discuss what phishing is, how to identify a phishing email, and how to protect your...