1. Top 10 Smart City Trends for 2018

    Top 10 Smart City Trends for 2018 Did you know that Smart Cities are poised to drive significant change in how we work, play and learn in 2018? Thanks to the explosion in big data analytics capabilities and mobile, real-time video/information sharing, historians may someday look back on this year as the fulcrum upon which technology and government fully meshed to turn their communities in a more…Read More

  2. Physical Security Isn’t Just Locks on the Doors

    Do you have a computer time out policy that turns off your screen within a few minutes of walking away? Do you have sticky notes on your monitor or passwords under your keyboard? Is your smartphone (with your business email on it) password protected? Are the network jacks in your public areas secure? Are your monitors turned so that the general public walking by in the hall can't see your screens?…Read More

  3. Be Security Aware with Healthcare Internet of Things

    At the recent Cybersecurity Symposium in Cheyenne, Mike Borowczak, a University of Wyoming security professor in the Computer Science department, discussed the Internet of Things and Security.  A few of the examples given were hospital or healthcare related and Medicine Bow Technologies wanted to share them with our customers. One of the most surprising data points was that Casper was number two …Read More

  4. Education and Information on Cybersecurity for You and Your Organization

    Security@Sunrise – Education and Information on Cybersecurity for You and Your Organization Sponsored By: Medicine Bow Technologies Date/Time:  Thursday, May 11th 7:30am – 9:00am Place: Wyoming Technology Business Center, BigHorn Conference Room; 2435 King Blvd, Casper, WY Tickets are just $10 for this great educational event to learn about real life cybersecurity threats and tips and enjoy …Read More

  5. New Ransomware Variant Targets Hospitals

    From Becker's Hospital Review; Written by Jessica Kim Cohen | April 11, 2017 |  http://www.beckershospitalreview.com/healthcare-information-technology/new-ransomware-variant-targets-hospitals.html A new ransomware kit called Philadelphia enables amateur cybercriminals to target hospitals, according to an analysis by Forcepoint, an Austin, Texas-based IT security company. Philadelphia, which Fo…Read More

  6. Wyoming Women’s Business Center Presents Cyber Security for Small Businesses

    ROUNDTABLE Wyoming Women’s Business Center Thursday, April 13th, 8:30-9:45 A.M. Laramie Plains Civic Center, Conference Room 208 710 Garfield St, Laramie, WY Join us in this FREE networking opportunity; meet other business owners! Bring a friend! RSVP: wwbc@uwyo.edu or call 307-460-3948 TOPIC:  Cyber Security for Small Businesses Learn the terminology so you can speak with your IT company. Lea…Read More

  7. Protect Your Computer From Hackers, Data Thieves and Everything Else!

    The Wyoming SBDC (Small Business Development Center) Network is hosting a webinar on Thursday, April 5 from 2-3 p.m. Mountain Time entitled "Protect Your Computer From Hackers, Data Thieves and Everything Else!" Are you worried your business or personal computer systems are going to be hacked? Do you worry that you may become a victim of Ransomware or other attack?   Join this session with Laura…Read More

  8. Break Fix Versus Managed Services for Information Technology

    Break-Fix The traditional method of IT management for smaller companies is break-fix.  What is break fix? Examples of a company that relies on break-fix information technology methods are shown below. You only call your information technology company when there is a problem. Equipment breaks and you either fix it or replace it. You have a do-it-yourself backup system that replicates to an externa…Read More

  9. Tackling Cyber Security

    IT security is a very complex issue. When it comes to data privacy, your organization is at a disadvantage from the very start. Over the past few decades, one popular idea has evolved from a tongue-in-cheek idiom to a stark reality for many organizations that store identity data: A hacker only has to get lucky one in a million times, you have to get lucky every single time. When tackling the IT s…Read More