What if your data is encrypted? Have you ever asked yourself what to do or how to prepare for such a scenario? The odds of falling victim to a ransomware attack are getting higher and higher. This year alone, there was a pipeline shut down in Texas due to ransomware,...
Three Mobile Threats To Watch Out For Cellphones Have Shaped The Current World. Whether we’re talking about a smartphone or tablet, these devices have undeniably changed the the 21st century and it’s not going to slow down any time soon. Though while...
Practicing Social Media Hygiene Social Media Affects Your Career And Your Identity. New research reveals that nearly two thirds of people are embarrassed of past images, posts, and other such content on their respective social media profiles. And to make matters...
The World of Smart Infrastructure and Security. With smart infrastructure and automation booming, experts are suggesting for businesses to take cyber security more seriously. Finland is a country considered to be leading the charge to incorporate smart tech...
A Refresher on the Ancient Art of Phishing Phishing; one of the oldest tricks in the cybercrime playbook. It first hit the digital scene in 1995, at a time when millions flocked to America Online (AOL) every day. If we know one thing about...
About The Author
Kevin Goodman, Managing Director
Kevin Goodman is our managing director and partner with BlueBridge Networks. As an expert in the field of cloud computing, he is the driving force behind our Ohio Cloud.
His commitment to excellent customer service has manifested the BlueBridge Difference.