New Edge Technology Solutions Blog

How to Stop Apps from Tracking You

In his classic novel 1984, George Orwell famously coined the phrase “Big Brother is watching you.” Little did he know that in the 70 years since the book’s publication, that has almost literally become true. In Orwell’s sci-fi novel, people were monitored by TVs in...

AI’s Role in Cybersecurity: The Role Humans Will Play

Twenty years ago, the idea of a car that drove itself would be considered in the realm of science fiction, right up there with time-traveling DeLoreans from Back to the Future. But now, self-driving cars are looking to change the way we drive, becoming just another...

Get Your Drones Now: FAA Propose Looser Rules

Remote-controlled cars and planes have been popular toys for decades. But, the past five years have seen a huge rise in popularity for drones, the remote-controlled aircraft that can fly to extraordinary heights and fast speeds. These devices can be bought from a...

Mobile App Cybersecurity: Your Phone is Putting You At Risk

If you think your mobile app is safe to download just because it comes from Google or Apple stores, think again. A staggering report released last October has shown that 85% of all mobile apps violate some form of safety standard. These had at least one security flaw...

Top Cyber Security Risks for 2019

The New Year is upon us and as always, it’s time to look back on the past and make educated predictions about what’s to come. In just the first half of 2018, data breaches of major companies saw 219 records stolen every second with the whole year on track to see...

Performance Driven Dashboards

Drive supply chain and manufacturing performance and optimization Few industries are as competitive as manufacturing and supply chain management. And in today’s market, competing on a global scale is imperative to long term growth and prosperity. The key to optimizing...

Dashboards: Critical, Yet Often Missing Components of Success

In today’s competitive landscape, being able to make intelligent, data driven decisions across all departments of your organization is critical to operating at peak levels of performance. Yet for many departmental heads, this data simply isn’t accessible, or readable...

Uncanny Targeted Advertising: Are You Being Stalked By Advertisers?

In his landmark novel 1984, George Orwell famously declared, “Big Brother is watching you.”  These days, it’s easy to become a little paranoid with all of the talk of hacking and spying in the news.  For years, we’ve accepted the fact that if we browse on Amazon for a...

Is Your Router Infected? Russian Hackers Target Routers

Another recent cyber attack has hit the Internet, but this time the targets are not computers, but network routers themselves.  Russian hackers “Fancy Bear” are believed to be behind this attack which would make it the second big hack they are affiliated with after...

Could You Be Cyber-Attacked While in the Hospital?

We have heard quite a bit about the dangers of cyber attacks.  Specifically, though, most of these stories center around hacking personal information such as social security numbers, checking accounts, and credit card numbers.  Identity theft and ruining your credit...

Is Your Child At Risk Using Disney Apps?

When you send your child out in the world, be it to school or outings with friends, you hope that they will be safe and protected.  To that end, many parents are buying smartphones for their children at a younger and younger age.  The rationale is that if the child...

Is Your Email Host Catching All The Malicious Malware?

For many of us in the business and technology fields, emails can be our lifeline.  Unfortunately, hackers also realize this and they are doing everything they can to subvert our emails and use them against us to infiltrate our networks.  That’s why we rely on our...