(219) 617-2651

Ron@ronbushconsulting.com

Blog

The Future & Fear With Driverless Cars

Google and Tesla both seem to get their share of headlines because of the innovation of both companies. In 2017, many of those headlines revolved around driverless cars. While most of us look forward to the convenience, anticipated safety and security of driverless cars, others among us may have different ideas.   For instance, ISIS sees it as a way of carrying out brutal attacks against innocent civilians without requiring the suicide of one of their own. Imagine instances of driverless cars around the globe, filled with explosives that can be detonated for the maximum loss of life and casualties at...

Continue reading

Phishing: Don’t Swallow that Hook!

While in Colorado on a recent trip, I recalled many a great meal eating Cutthroat trout, which is native to that area. The memories took me back to the fun of fishing in some little stream and the fight a little fish can put up before being reeled in. Ah yes, fond memories that get better with each passing decade.   However, in this blog post I’ll discuss a different kind of catch that even has its own spelling: phishing. In this application of the term you and I are the ones being pursued and unfortunately often caught.   It is estimated...

Continue reading

A Business Continuity Solution for Ransomware

A Business Continuity Solution for Ransomware ShareSync by Ron Bush Consulting, is a 2-in-1 backup and file sharing service, offers a complete file management solution. Among its benefits: users stay up-and-running during a ransomware outbreak. Instantly roll back to uninfected files. Immediately access those clean files on any device Keep users productive while IT restores infected computers Avoid paying ransom to criminals Plus: save money with a 2-in-1 backup and file sharing service ShareSync combines real-time backup and file sharing into a single product. This 2-in-1 feature set enables file collaboration similar to Box and Dropbox alongside complete file backup and recovery...

Continue reading

February Newsletter

So let me ask you a question: do you need the internet to do business?  Let's say the internet was down all day.  It could be a weekend or a day or two during the week.  Maybe a few hours or maybe longer.  Would it affect your business?  For some reading this newsletter, eh, not so much.  For others, it would be devastating....

Continue reading

Learn how to protect yourself!

Most business owners and managers know they do not. Most IT directors and Chief Information Officers also know that they do not know where all their data is, but refuse to admit it to the “upstairs”. The truth is that an easy 95% do not whether they realize it or not. Word documents, Excel spreadsheets, PDF documents and so forth proliferate on individual hard drives, external hard drives, jump drives, smart phones and tablets, especially where the company or organization allows employees and management to bring their own devices (BYOD). It may be because employees are in a hurry and...

Continue reading

InfoSec P&P

The first step is admit that you are at risk. Then get educated on HOW you are at risk. You cannot solve a problem that you are unaware of or deny its existence. In my interaction with business owners I never cease to be amazed at how many believe it will be someone else who is breached....

Continue reading

Identity Theft

I believe that the most precious thing that any of us own is our identity. It is who we are. It is where we live and breathe. Our reputation, everything known about us, positive or negative, true or false, makes up our identity. To idly stand by and let someone steal it and pervert it is irresponsible....

Continue reading