> Search Results
55 results found with an empty search
Blog Posts (32)
- Quantum computing and the threat to modern encryption
(Above: IBM's Osprey quantum computer, source: https://www.popsci.com/technology/ibm-quantum-summit-osprey/ ) The math and machines behind the future of privacy online are fiendishly complex — Modern encryption works because of the extraordinary amounts of time required to decrypt data that is passed through ‘one-way’ mathematical functions. So far, the time and computing resources needed to decrypt sensitive data have served as an effective barrier to massive, wide-ranging, brute-force decryption attacks. With advances in quantum computing, however, barriers to cracking current cryptographic standards are rapidly disappearing. Advances in the raw compute power of quantum processors are only one part of the equation; research into more efficient algorithms for decrypting encrypted data is also poised to turn quantum computers into highly adept encryption-breaking platforms. In 2017, Charles Neill at UC Santa Barbara and Pedram Roushan at Google unveiled a proof-of-concept ‘superconducting qubit’. In quantum mechanics, superconductivity can be achieved by cooling a substance (liquid metal in this case) to an extremely low temperature and introducing an electrical current. The principle of superconductivity allows this current to flow forever, in both directions simultaneously. This behavior of the electrical current in the liquid metal represents a qubit that can simultaneously represent a 0 and a 1. In classical computing, a bit can only represent a 0 or a 1 at an arbitrary point in time. Qubits, meanwhile, can store values of 0 and 1 at the same time, allowing an equivalent number of qubits to store exponentially more number values than bits. To put this in more practical terms, just 50 qubits can store 10 quadrillion numbers; a classical computer would require a petabyte-scale memory system to store the same number of values. The main concern from physicists about such a system is that mathematical errors would scale rapidly with the size of the quantum system. Neill and Roushan demonstrated that errors only increased slowly, suggesting that a meaningful superposition of up to approximately 60 qubits could be attained. A superposition of 60 qubits would surpass the researchers’ initial goal of 49 to 50 qubits, while theoretically producing a manageable number of errors. Since this research was published in 2017, the field of quantum computing has advanced rapidly. As of October 2023, the fastest quantum computer in the world has surpassed 1000 qubits . For comparison, Microsoft estimates that 2500 qubits would be necessary to crack modern 256-bit AES encryption. Just one year earlier, in 2022, the fastest quantum computer in the world was IBM’s Osprey system, at 433 qubits . If advancements continue at this pace, modern 256-bit encryption could be cracked in only a few years. While the general public does not have access to quantum computing resources, research universities, high-tech corporations, governments, and militaries certainly will. At that point, the genie will have been released from the bottle and we must then assume that data encrypted with ‘legacy’ ciphers is no longer secure. However, it’s crucial to keep in mind that sheer qubit numbers aren't the final word in quantum performance. Accuracy counts more than raw speed in most classical computing paradigms, with quantum computers being no exception. The difference, though, is that quantum computers are considered “noisy” in that they lose their quantum state over time. A degradation in quantum state means worthless results are produced; considering the running costs of a quantum computer, vast resources have been invested into improving the accuracy and reliability of these systems. Electromagnetic interference and changes in magnetic fields cause qubits to lose their quantum states, necessitating exotic and complex cooling and environmental isolation solutions which are prohibitively expensive for all but large enterprise and government institutions. As of mid-2024, research at the Chalmers University of Technology in Gothenburg, Sweden has found that the use of harmonic oscillators can control error rates and thus produce a quantum computing system that can run longer calculations. The researchers at Chalmers University explain: “The oscillators used in the study consist of thin strips of superconducting material patterned on an insulating substrate to form microwave resonators, a technology fully compatible with the most advanced superconducting quantum computers. The method is previously known in the field and departs from the two-quantum state principle as it offers a much larger number of physical quantum states, thus making quantum computers significantly better equipped against errors and noise.” Source: https://www.chalmers.se/en/current/news/mc2-breakthrough-may-clear-major-hurdle-for-quantum-computers/ While errors remain a roadblock to the “quantum supremacy” Google researchers envisioned in 2017, research into reducing error rates is producing actionable scientific results that promise to make quantum computers more accurate and less susceptible to environmental influence. Predicting the assault of more advanced and less error-prone quantum computers, the National Institute of Standards and Technology (NIST) in 2022 announced its first four quantum-resistant cryptographic algorithms. These algorithms rely on mathematical models that are designed to resist decryption attacks from both classical and quantum computers, as part of NIST’s Post-Quantum Cryptography Standardization Project . For general encryption, NIST chose the CRYSTALS-Kyber algorithm to defend against future quantum decryption attacks. For digital signatures, CRYSTALS-Dilithium (a nod to the fictitious dilithium crystals featured in Star Trek ), FALCON , and SPHINCS+ were selected. Three of the algorithms chosen by NIST operate based on a family of mathematical problems known as structured lattices , while SPHINCS+ uses more conventional hashing functions. As ever, the march of increasingly powerful microprocessors and more advanced cryptographic algorithms demands that digital citizens of all stripes adopt and maintain best security practices. Small businesses are especially vulnerable to more advanced credential theft, phishing, impersonation, and brute-force decryption attacks. Get in touch with Geeks for Business today to learn how you can secure your organization’s digital footprint.
- 9 Tips for Troubleshooting Networking Issues
There's nothing quite as frustrating as a sudden internet outage. Whether you're working from home, streaming your favorite show, or simply staying connected with friends and family, a loss of internet can disrupt your entire day. The question that inevitably arises is, "why is it down, and when will it come back?" While there's no one-size-fits-all answer, there are several troubleshooting steps you can take to diagnose and potentially resolve the issue. Basic Troubleshooting: The Quick Fixes Reboot Your Router: This classic tech remedy often does the trick. A simple restart can refresh your router's connection and resolve minor glitches. Check Connections: Ensure all cables are securely plugged into your router, modem, and devices. Loose or damaged connections can interrupt the internet signal. Advanced Troubleshooting: Network Diagnostics Run a Network Test: To assess the overall health of your network, use the ping command in your device's command prompt. Pinging a public DNS server like 1.1.1.1 will provide information about the latency and packet loss between your device and the internet. Refresh IP Address: Sometimes, a simple IP address renewal can resolve connectivity issues. Use the ipconfig /release and ipconfig /renew commands to force your device to obtain a new IP address. Software and Firmware Updates Update Router Firmware: Outdated firmware can lead to stability problems. Check your router's manufacturer's website for the latest firmware updates and install them as recommended. Provider-Related Issues Contact Your Internet Service Provider: If the above steps don't resolve the issue, it's possible there's a broader outage in your area. Contact your ISP to check for any known service disruptions or planned maintenance. Occasionally, a faulty piece of outside equipment, such as a passive coaxial splitter, is the source of trouble in your network. While end users can replace these devices, we suggest contacting your Internet Service Provider and reporting the issue so that they may troubleshoot and resolve the issue. Seeking Professional Assistance Consult Your IT Support Team: If you're unable to resolve the issue on your own, reach out to your IT support team for further assistance. They can diagnose more complex problems and provide tailored solutions. Consider Professional IT Services: If you don't have an in-house IT team, consider partnering with a professional IT service provider like Geeks for Business. We offer comprehensive network support, security, troubleshooting, and maintenance. Don't Let Internet Outages Disrupt Your Business A reliable internet connection is essential for businesses of all sizes. By following these troubleshooting steps and seeking professional help when needed, you can minimize the impact of internet outages and ensure uninterrupted productivity. If you're facing challenging network-related issues, reach out to Geeks for Business today. Whether you're managing a single office, working from home, or connecting multiple sites, Geeks for Business helps clients implement secure networking solutions that keep business running.
- Crowdstrike: A Drama in Three Acts
— Mistah Kurtz-he dead A penny for the Old Guy On July 19th, 2024, Crowdstrike, a well-known cybersecurity provider within private and public IT realms, managed to send industries from air travel to healthcare into various states of meltdown thanks to an unvalidated agent update. This update threw millions of Windows devices into bootloops, sending companies large and small into utter technical chaos for days. Delta Airlines CEO Ed Bastian alleges Crowdstrike’s botched update cost Delta $500 million, a claim which Crowdstrike CEO George Kurtz has dismissed, pinning the blame on Delta for its refusal to accept technical assistance from Crowdstrike. Delta’s legal action against Crowdstrike is one in a sea of lawsuits materializing against the company for the massive losses the defective update caused. Overall monetary losses to Crowdstrike’s Fortune 500 clients are estimated to be around $5 billion . To understand why this buggy update was so devastating, we must understand the way Crowdstrike’s Falcon EDR (endpoint detection and response) platform works. The Falcon EDR agent requires a kernel-mode driver which grants it low-level access to the Windows operating system. This kernel driver allows the Falcon agent to continuously monitor Windows user space and kernel space for malicious executables, attachments, and other potential cybersecurity threats. This model provides a substantial degree of cybersecurity protection to the device, but the use of a kernel-mode driver presents a double-edged sword: if the driver fails to initiate the Crowdstrike agent correctly, the operating system can crash and subsequently fail to boot. Microsoft’s response to this was to issue a technical incident response memo about the Crowdstrike failure, discouraging security vendors from using kernel-mode drivers. Crowdstrike’s kernel-mode driver, while signed and blessed by Microsoft, relies on frequent updates from Crowdstrike which are not individually signed or audited by Microsoft, or any other third-party. Thus, while the driver itself was deemed safe, the Falcon agent failed to parse a bad configuration file from Crowdstrike, causing the program to access memory it shouldn’t have accessed, bringing down the kernel and the operating system along with it. Kernel-space code runs close to the hardware (or ‘near the metal’), which is advantageous for cybersecurity applications that need low-level operating system access. This low-level access, however, has to be weighed against the potentially devastating outcomes of a bad update or untested configuration change. David Weston, Vice President of Microsoft’s Enterprise and Operating System Security, outlined a process for granting a security application’s kernel-space access while reducing the risk to the kernel in the event of a botched update: "For example, security vendors can use minimal sensors that run in kernel mode for data collection and enforcement, limiting exposure to availability issues," he explained. "The remainder of the key product functionality includes managing updates, parsing content, and other operations that can occur isolated within user mode where recoverability is possible." Crowdstrike places the blame for the failed update on its content validation pipeline. What remains unclear is how many standard industry practices Crowdstrike has actually adopted, such as sandboxing for update and change testing. Worryingly, this kind of failure suggests a lack of industry-standard CI/CD (continuous integration/continuous deployment) practices which most likely could have prevented the global outage caused by the bungled update. In the wake of Crowdstrike’s global IT wreckage, Microsoft announced its intention to "to work with the anti-malware ecosystem to take advantage of these integrated features to modernize their approach, helping to support and even increase security along with reliability." Microsoft’s guidance involves: Providing guidance and best practices for updating and rolling out of cybersecurity product patches Reducing need for Windows kernel space access in order to obtain critical security information Implementing enhanced isolation and anti-tampering capabilities in Windows, utilizing tech like VBS Enclaves Implementing Zero Trust approaches such as High Integrity Attestation, providing a method for determining the security status of a computer by monitoring its native security features (eg: Windows Defender for Endpoint) In spite of the initial backlash against Crowdstrike for its sloppy patching pipeline, most Crowdstrike customers report they plan to remain customers rather than migrate to competing cybersecurity platforms. Whether this speaks to the inherent complexity of switching cybersecurity providers is an open question; in the tech space, vendor lock-in is an ongoing problem that hasn’t eased much in recent decades. Some tech analysts have even suggested that now is the time to buy into Crowdstrike’s platform, as Crowdstrike is incentivized to beef up its CI/CD practices and focus on delivering a stable product, in light of its very public failure to follow best development and test practices. No matter where Crowdstrike or its users land, the incident points out very real flaws in modern endpoint detection and response platforms. Crowdstrike isn’t the only company whose application relies on kernel-level access to the host operating system. This practice is widespread throughout the industry, with Microsoft bearing its own share of culpability in all but forcing security vendors to play in the dangerous kernel sandbox in order to develop security apps that do what they claim on the tin. Microsoft’s response to the Crowdstrike fracas is a naked attempt to make Microsoft look good while not-so-subtly throwing security vendors under the bus for doing what they had to do to make their products function as intended. In Microsoft Land, throwing corporate partners, lucrative resellers, and end-users under the bus when push comes to shove is nothing new. In a world where technology is becoming increasingly enshittified , prices increasingly stratospheric, and technical sanity increasingly hard to find, the Crowdstrike fiasco underscores a more central need: to end over-reliance on single vendors, and on single points of failure in general. A company like Crowdstrike or Microsoft will promise you the world (and sell it to you, at prices to match), but when things fall apart they won’t be there to save your business. This is the importance of local IT: your business is only as resilient as the IT processes you have in place. Microsoft will sell you Exchange Online, but they won’t test your backups for you. Crowdstrike will sell you Falcon, but they aren’t going to perform phishing simulations or work with your employees to understand modern security threats. These companies are selling a solution, and it’s up to you to implement that solution in a way that makes sense for your use case while following best industry practices. Get in touch with Geeks for Business today to learn more about how managed IT can keep your business running, even when the Crowdstrikes of the world drop the ball.
Other Pages (23)
- Geeks for Business - Let's Make IT Easy - Managed IT Service
Geeks for Business is the Triangle's premier managed IT service provider for small- and medium-sized businesses. Let's Make IT Easy Let's Make IT Easy Let's Make IT Easy Let's Make IT Easy Geeks for Business is the Triangle's premier Managed IT Service provider Isn't it time for the IT support your business deserves? We take the stress out of IT, so you're able to focus less on tech and more on running your business. Learn more about how we simplify IT here Pricing guide Get in touch Learn more Managed Cloud Do you know what your business really spends on cloud services? Are you making the best use of your cloud services budget? Are your cloud applications and identities secure and backed up? Cloud adoption rates are nearly 100% across businesses of all sizes, while managing multi-cloud environments is increasingly complex. From Identity and Access Management to Microsoft 365 backups and on-premise to cloud migrations, we make cloud stress-free. + Learn More Cybersecurity Ransomware payments exceeded $1 billion for the first time ever in 2023. Don't run the risk of costly business downtime in the event of an attack. Geeks for Business leverages next-generation security services to protect your critical company assets. + Learn More Disaster Recovery Business continuity and disaster recovery should be top-of-mind for business leaders. Does your business have a recovery strategy in case of a ransomware attack or hardware failure? Learn how Geeks for Business can design and execute operational continuity and recovery procedures for your company. + Learn More Unlimited Remote Support & Help Desk Each of our Managed IT plans provides convenient Managed Support options for your business. Enjoy unlimited remote tech support, onsite support, outsourced help desk, and tailored tech support and training plans with Geeks for Business. + Learn More Managed Networking From design and installation to security and management, Geeks for Business provides comprehensive managed networking solutions for your business. From Internet failover solutions to site-to-site VPNs and secure, remote application access, we have years of experience in implementing and securing modern networks. + Learn More Testimonials What our clients are saying Cannot beat Matt. He was responsive, on time, quickly identified my problems, explained the fix and resolved the issues in no time. Just first class. I don't believe I will ever look elsewhere. Thanks! Edward S. Cary, NC
- Causes | Geeks for Business
Causes we care about Causes We Support It's no secret our environment is in dire shape. Pollinators are facing population collapse, fossil fuel pollution continues to propel global climate change, biodiversity and wild areas are under growing assault from human interests. This is why we feel it's important to be candid about environmental causes we support in our area. We want to encourage everyone, whether you work with us or not, to dedicate some of your time to help the organizations below. This page is under active development. info@leaflimb.com 919-787-9551 www.leaflimb.com Donate to Project Pando Project Pando (by Leaf & Limb ) Leaf & Limb, based in Raleigh, NC, describes their vision: "Increase the health and population of trees to help address pressing environmental issues and restore the balance of life on Earth." Project Pando seeks to connect people with trees, providing native trees to any person or organization who needs them. Their goals of outreach, education, and environmental restoration are goals we deeply and actively support. Keep Durham Beautiful Keep Durham Beautiful is a Durham, NC based nonprofit that we want more people to know about. Their work in removing waste from outdoor spaces, establishing community gardens, and restoring our local environment is critically important and more needed than ever. Geeks for Business has worked with Keep Durham Beautiful to plant trees, shrubs, and bulbs in public spaces and at our offices, in addition to volunteering our time to assist in their regular waste cleanup efforts. info@keepdurhambeautiful.org 919-354-2729 www.keepdurhambeautiful.org Donate to Keep Durham Beautiful The Eno River Association https://www.enoriver.org/donate/ 04 Project Name Placeholder
- Our Work - Geeks for Business
Find out why Geeks for Business is so highly rated by checking out our project portfolio. The Geeks for Business Portfolio Board-level repair of a MacBook Pro Performing board-level diagnosis of a MacBook Pro that doesn't turn on Ubiquiti CloudKey controller Upgrading a business client's network from a 10-year old Linksys router to a modern, cloud-manageable Ubiquiti network Type 110 punchdown block A 110 block at a business client's location; 110 blocks are modern versions of older 66 blocks and are used to distribute landline phone and Ethernet wiring through buildings. Network rack during upgrade Business client's existing 19" depth network rack, during an upgrade performed by Geeks for Business. We are removing old equipment and installing a new 24-port Ethernet switch, a new router, PDU (power distribution unit), and patch panel Patch panel A business client's new Ethernet patch panel during an extensive network upgrade performed by Geeks for Business. Patch panel Additional wiring between the new patch panel and the customer's existing Ethernet switch Plywood backing for structured wiring installation Installing plywood backing in a customer's basement, on masonry, to support a structured wiring cabinet from which all of the customer's low voltage cabling will be distributed Structured wiring cabinet Installing a structured wiring cabinet, with new Ethernet and coaxial cable distributed throughout the customer's home. Terminating Cat6 Ethernet cable Here, we're terminating Cat6 Ethernet cable with pass-through RJ-45 connectors Structured wiring installation Having installed the structured wiring cabinet, patch panel, surge protector, outlets, and other items, we're making all the connections for Ethernet, phone, and coaxial Customer's network rack Wire shelving used to store the customer's network attached storage server, AT&T fiber modem, and other items Structured wiring installation, completed Having made all the necessary connections between the switch and patch panel, cable tidying is done and the structured wiring install is complete Audio-visual rack for a church A client at a church requested that we install new AV equipment for their service recordings and Zoom services during the pandemic. Geeks for Business installed cameras, mixers, microphones, a new workstation PC, and networking equipment for the church. Workstation computer A custom-built workstation PC by Geeks for Business. Diagnosing issues with outside telephone wiring Geeks for Business performed diagnostics on outdoor phone wiring to remedy dropped Internet connections over DSL for a rural client Network rack at a hospice care facility Geeks for Business upgraded a local hospice care facility's network with new power distribution hardware, new switches, routers, and WiFi access points, and new network racks Ubiquiti WiFi access point Geeks for Business installed a new wireless network for a retail client in Chapel Hill, NC Structured wiring cabinet with patch panel An older structured wiring cabinet from a 1980s home. Geek Housecalls rewired the cabinet, installing new Ethernet and coaxial cable, as well as a new router, switch, TV antenna, and TV antenna amplifier. The patch panel is mounted above the wiring alcove as the cabinet was not wide enough to accommodate it. New outlet and TV wall mount Geek Housecalls installed a new electrical receptacle, as well as a new wall mount for a large OLED television at a client's home TV mounted on wall mount The 65" TV has been mounted on the wall mount and connected to power and coax Finished TV wall mount The final product: a 65" OLED TV on an articulating wall mount