COVID-19 Update: All live classes can be attended from home. Learn More

Category: Featured

May 18th

What is Robotic Process Automation (RPA)?


Robotic Process Automation (RPA) is the technology that allows anyone today to configure computer software, or a “robot” to emulate and integrate the actions of a human interacting within digital systems to execute a business process. RPA robots utilize the user interface to capture data and manipulate applications just like humans do. They interpret, trigger responses and communicate with other systems in order to perform on a vast variety of repetitive tasks. Only substantially better: an RPA software robot never sleeps and makes zero mistakes.

UiPath Enterprise RPA Platform – AI Powered Automation
Babbage Simmel partners with UiPath. Built for both business and IT, UiPath is the leading platform for Enterprise Robotic Process Automation (RPA). The UiPath platform simplifies digital transformation by rapidly automating processes. Organizations across the world work with UiPath to streamline millions of tasks — improving productivity, customer experience, and job satisfaction.

To learn more about RPA – click HERE.

Get in touch with us!
Questions about Robotic Process Automation?  Let’s talk (614) 481-4345 or e-mail info@babsim.com.

ALSO SEE: LEARN AWS BUSINESS & TECHNICAL ESSENTIALS – ON US!

May 15th

Master These 5 Skills with CySA+ Training

CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioral analytics to networks and devices to prevent, detect and combat cybersecurity threats through continuous security monitoring. CySA+ is the only intermediate high-stakes cybersecurity analyst certification with performance-based questions that covers core security analyst skills while emphasizing software and application security, automation, threat hunting, and IT regulatory compliance.

Protect and defend your systems with CySA+!

According to CompTIA, you will master the following skills with the Cybersecurity+ training:

#1 Threat and Vulnerabilty Management

Analyze and apply proactive threat intelligence to support organizational security and perform vulnerability management activities.

#2 Software and Systems Security

Apply security solutions for infrastructure management and explain software & hardware assurance best practices.

#3 Compliance and Assessment

Apply security concepts in support of organizational risk mitigation and understand the importance of frameworks, policies, procedures, and controls.

#4 Security Operations and Monitoring

Analyze data as part of continuous security monitoring activities and implement configuration changes to existing controls to improve security.

#5 Incident Response

Analyze and apply the appropriate incident response procedure, analyze potential
indicators of compromise, and utilize basic digital forensics techniques.

Join us for our next CompTIA Cybersecurity+ Analyst Certification training starting on June 1st. CompTIA Security+ Certification Support Skills training is available starting June 8th. And CompTIA Network+ Certification Support Skills training is available.

For more information about CompTIA certification or any other training please call (614) 481-4345 or e-mail info@babsim.com.

May 11th

Free Workshop on AWS Technical Essentials

BACK BY POPULAR DEMAND!

Part 1 on May 26th at 2:00pm or May 27th at 11:00am
Part 2 on May 27th at 2:00pm or May 28th at 11:00am
Eastern Time (2 hours each)

Babbage Simmel, in partnership with TLG Learning, is conducting a Free AWS Technical Essentials workshop virtually!

This virtual workshop is divided into two separate two hour sessions. Please select and register for the workshop you will be able to attend that best fits your schedule.

If you are interested in learning how to get started with AWS, or if you are a SysOps Administrator, Solutions Architect, or Developer interested in using the AWS services, then you should not miss out on this workshop!

AWS certified instructor John Kacmarynski will be conducting this workshop divided into two sessions where the first workshop will cover the following:

  • Recognize terminology and concepts as they relate to the AWS platform and navigate the AWS Management Console.
  • Understand the foundational services, including Amazon Elastic Compute Cloud (EC2), Amazon Virtual Private Cloud (VPC), Amazon Simple Storage Service (S3), and Amazon Elastic Block Store (EBS).
  • Understand the security measures AWS provides and key concepts of AWS Identity and Access Management (IAM).

Having access to Labs post-event on:

  • Introduction to Amazon Simple Storage Service (S3)
  • Introduction to AWS Identity and Access Management (IAM)

While the second workshop on AWS Tech Essentials will cover the following topics:

  • Understand AWS database services, including Amazon DynamoDB and Amazon Relational Database Service (RDS).
  • Understand AWS management tools, including Auto Scaling, Amazon CloudWatch, Elastic Load Balancing (ELB), and AWS Trusted Advisor.

Having access to Labs post-event on:

  • Introduction to Amazon DynamoDB
  • Introduction to AWS Key Management Service
  • Introduction to AWS Lambda

Do not miss this incredible opportunity to learn about AWS Technical Essentials. Please register today as seating is very limited and no recordings will be provided for this workshop.

Interested in AWS Business Essentials? Click HERE.

Don’t miss out on this opportunity to learn with us. E-mail info@babsim.com or call (614) 481-4345 to with your questions or to learn more.

May 11th

Free Webinar on AWS Business Essentials

BACK BY POPULAR DEMAND!

May 26th at 11:00 am or May 29th at 1:00 pm Eastern Time (90 Minutes)

Are you interested in learning the advantages of cloud computing for your business? Are you confused about how to migrate to the AWS cloud? Then we are here to help!

Sign up for our FREE Webinar on AWS Business Essentials and join our expert instructor to explore the advantages of cloud computing for your business and the fundamentals of AWS, including financial benefits.

In this webinar, you will learn how to:

  • Identify the value and advantages of the AWS Cloud
  • Recognize the valuable ways that the AWS platform can be used
  • Understand the robust security capabilities, controls, and assurances in place to maintain data and network security
  • Articulate the financial impact the AWS Cloud can have on an organization’s cost management while minimizing the risks associated with consumption-based pricing models

During this webinar you will also have the opportunity to interact with AWS certified trainer, John Kacmarynski, and ask your queries in the live Q&A session. Limited seats are available so we strongly recommend you register beforehand as a recording of this webinar WILL NOT be available after the session so don’t miss out.

Interested in AWS Technical Essentials? Click HERE.

Don’t miss out on this opportunity to learn with us. E-mail info@babsim.com or call (614) 481-4345 to with your questions or to learn more.

May 10th

Complimentary AWS Virtual Workshop Series

BACK BY POPULAR DEMAND! We are offering another round of complementary live AWS instructor-led online workshops to get you started on your AWS Cloud journey.

Upcoming Complimentary AWS Learning Opportunities:
Webinar – AWS Business Essentials
Online Workshop – AWS Technical Essentials Part 1 and Part 2

Next Steps

Don’t miss out on this opportunity to learn with us. E-mail info@babsim.com or call (614) 481-4345 to with your questions or to learn more.

Feb 17th

A Beginner’s Guide to Cloud Computing

What is Cloud Computing?

Simply put, cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale. You typically pay only for cloud services you use, helping you lower your operating costs, run your infrastructure more efficiently, and scale as your business needs change.

MICROSOFT AZURE FUNDAMENTALS

Benefits of Cloud Computing

Cloud computing is a big shift from the traditional way businesses think about IT resources. Here are seven common reasons organizations are turning to cloud computing services:

Cost

Cloud computing eliminates the capital expense of buying hardware and software and setting up and running on-site datacenters—the racks of servers, the round-the-clock electricity for power and cooling, and the IT experts for managing the infrastructure. It adds up fast.

Speed

Most cloud computing services are provided self-service and on-demand, so even vast amounts of computing resources can be provisioned in minutes, typically with just a few mouse clicks, giving businesses a lot of flexibility and taking the pressure off capacity planning.

Global scale

The benefits of cloud computing services include the ability to scale elastically. In cloud speak, that means delivering the right amount of IT resources—for example, more or less computing power, storage, bandwidth—right when they’re needed, and from the right geographic location.

Productivity

On-site datacenters typically require a lot of “racking and stacking”—hardware setup, software patching, and other time-consuming IT management chores. Cloud computing removes the need for many of these tasks, so IT teams can spend time on achieving more important business goals.

Performance

The biggest cloud computing services run on a worldwide network of secure datacenters, which are regularly upgraded to the latest generation of fast and efficient computing hardware. This offers several benefits over a single corporate datacenter, including reduced network latency for applications and greater economies of scale.

Reliability

Cloud computing makes data backup, disaster recovery, and business continuity easier and less expensive because data can be mirrored at multiple redundant sites on the cloud provider’s network.

DEVELOPING SOLUTIONS FOR MICROSOFT AZURE

Types of Cloud Computing

Not all clouds are the same and not one type of cloud computing is right for everyone. Several different models, types, and services have evolved to help offer the right solution for your needs.

First, you need to determine the type of cloud deployment, or cloud computing architecture, that your cloud services will be implemented on. There are three different ways to deploy cloud services: on a public cloud, private cloud, or hybrid cloud.

Public Cloud

Public clouds are owned and operated by a third-party cloud service providers, which deliver their computing resources, like servers and storage, over the Internet. Microsoft Azure is an example of a public cloud. With a public cloud, all hardware, software, and other supporting infrastructure is owned and managed by the cloud provider. You access these services and manage your account using a web browser.

Private Cloud

A private cloud refers to cloud computing resources used exclusively by a single business or organization. A private cloud can be physically located on the company’s on-site datacenter. Some companies also pay third-party service providers to host their private cloud. A private cloud is one in which the services and infrastructure are maintained on a private network.

Hybrid Cloud

Hybrid clouds combine public and private clouds, bound together by technology that allows data and applications to be shared between them. By allowing data and applications to move between private and public clouds, a hybrid cloud gives your business greater flexibility, more deployment options, and helps optimize your existing infrastructure, security, and compliance.

MICROSOFT AZURE ADMINISTRATOR

Get in touch with us!
Questions about Azure or any other training?  Call (614) 481-4345 or e-mail info@babsim.com.

 

Oct 23rd

10 Common Cybersecurity Misconceptions


COMMON CYBERSECURITY MISCONCEPTIONS FOR SMALL AND MEDIUM-SIZED ORGANIZATIONS

Misconception #1: My data (or the data I have access to) isn’t valuable.

All data is valuable

Take Action: Do an assessment of the data you create, collect, store, access, transmit and then classify all the data by level of sensitivity so you can take steps to protect it appropriately.

Misconception #2: Cybersecurity is a technology issue.

Cybersecurity is best approached with a mix of employee training; clear, accepted policies and procedures and implementation of current technologies.

Take Action: Educate every employee on their responsibility for protecting sensitive information.

Misconception #3: Cybersecurity requires a huge financial investment.

Many efforts to protect your data require little or no financial investment.

Take Action: Create and institute cybersecurity policies and procedures, restrict administrative and access privileges, enable multi-factor authentication and train employees to spot malicious emails.

Misconception #4: Outsourcing to a vendor washes your hands of liability during a cyber incident.

You have a legal and ethical responsibility to protect sensitive data.

Take Action: Put data sharing agreements in place with vendors and have a trusted lawyer review.

Misconception #5: Cyber breaches are covered by general liability insurance.

Many standard insurance policies do not cover cyber incidents or data breaches.

Take Action: Speak with your insurance representative to understand your coverage
and what type of policy would best fit your organization’s needs.

Misconception #6: Cyberattacks always come from external actors.

Succinctly put, cyberattacks do not always come from external actors.

Take Action: Identify potential cybersecurity incidents that can come from within the
organization and develop strategies to minimize those threats.

Misconception #7: Younger people are better at cybersecurity than others.

Age is not directly correlated to better cybersecurity practices.

Take Action: Before giving someone responsibility to manage your social media, website and network, etc., train them on your expectations of use and cybersecurity best practices.

Misconception #8: Compliance with industry standards is sufficient for a security strategy.

Simply complying with industry standards does not equate to a robust cybersecurity strategy for an organization.

Take Action: Use a robust framework, such as the NIST Cybersecurity Framework, to
manage cybersecurity risk.

Misconception #9: Digital and physical security are separate things altogether.

Do not discount the importance of physical security.

Take Action: Develop strategies and policies to prevent unauthorized physical access to sensitive information and assets (e.g., control who can access certain areas of the office.)

Misconception #10: New software and devices are secure when I buy them.

Just because something is new, does not mean it is secure.

Take Action: Ensure devices are operating with the most current software, change the manufacturer’s default password to a unique, secure passphrase and configure privacy settings prior to use.

Next Steps For You

Now that you’re more aware of common cybersecurity misconceptions, the next step is to sharpen your security skills, either for upskilling or with the idea of starting a new career. Babbage Simmel’s Comprehensive NIST Cybersecurity Framework (NCSF) Training & CompTIA CySA+ Cybersecurity Analyst Certification Cybersecurity training options will equip you with the skills needed to become an expert in the security field. You will learn comprehensive approaches to protecting your infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud-based security, achieving compliance and much much more.

Questions about Cybersecurity?  Get in touch!

 

 

Source: staysafeonline.org/cybersecure-business

Oct 18th

5 Steps to Protecting Your Digital Home


More and more of our home devices— including thermostats, door locks, coffee machines, and smoke alarms—are now connected to the Internet. This enables us to control our devices on our smartphones, no matter our location, which in turn can save us time and money while providing convenience and even safety. These advances in technology are innovative and intriguing, however, they also pose a new set of security risks. #BeCyberSmart to connect with confidence and protect your digital home.

SIMPLE TIPS TO PROTECT IT

  • Secure your Wi-Fi network. Your home’s wireless router is the primary entrance for cybercriminals to access all of your connected devices. Secure your Wi-Fi network and your digital devices by changing the factory-set default password and username.
  • Double your login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring. Read the Multi-Factor Authentication (MFA) How-to-Guide for more information.
  • If you connect, you must protect. Whether it’s your computer, smartphone, game device, or other network devices, the best defense is to stay on top of things by updating to the latest security software, web browser, and operating systems.
    If you have the option to enable automatic updates to defend against the latest risks, turn it on. And, if you’re putting something into your device, such as a USB for an external hard drive, make sure your device’s security software scans for
    viruses and malware. Finally, protect your devices with antivirus software and be sure to periodically back up any data that cannot be recreated such as photos or personal documents. Learn more about the Internet of Things (IoT) or smart devices which refer to any object or device that is connected to the Internet.
  • Keep tabs on your apps. Most connected appliances, toys, and devices are supported by a mobile application. Your mobile device could be filled with suspicious apps running in the background or using default permissions you never realized you approved—gathering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and use the “rule of least privilege” to delete what you don’t need or no longer use. Learn to just say “no” to privilege requests that don’t make sense. Only download apps from trusted vendors and sources.
  • Never click and tell. Limit what information you post on social media—from personal addresses to where you like to grab coffee. What many people don’t realize is that these seemingly random details are all that criminals need to know to target you, your loved ones, and your physical belongings—online and in the real world. Keep Social Security numbers, account numbers, and passwords private, as well as specific information about yourself, such as your full name, address, birthday, and even vacation plans. Disable location services that allow anyone to see where you are— and where you aren’t —at any given time. Read the Social Media Cybersecurity Tip Sheet for more information.

Next Steps For You

Now that you’re more aware of protecting your digital home, the next step is to sharpen your security skills, either for upskilling or with the idea of starting a new career. Babbage Simmel’s Comprehensive NIST Cybersecurity Framework (NCSF) Training & CompTIA CySA+ Cybersecurity Analyst Certification Cybersecurity training options will equip you with the skills needed to become an expert in the security field. You will learn comprehensive approaches to protecting your infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud-based security, achieving compliance and much much more.

Questions about Cybersecurity?  Get in touch!

Oct 17th

If You Connect, You Must Protect


Internet of Things (IoT) or smart devices refers to any object or device that is connected to the Internet. This rapidly expanding set of “things,” which can send and receive data, includes cars, appliances, smart watches, lighting, home assistants, home security, and more. #BeCyberSmart to connect with confidence and protect your interconnected world.

WHY SHOULD WE CARE?

  • Cars, appliances, wearables, lighting, healthcare, and home security all contain sensing devices that can talk to another machine and trigger other actions. Examples include devices that direct your car to an open spot in a parking lot;
    mechanisms that control energy use in your home; and tools that track eating, sleeping, and exercise habits.
  • New Internet-connected devices provide a level of convenience in our lives, but they require that we share more information than ever.
  • The security of this information, and the security of these devices, is not always guaranteed. Once your device connects to the Internet, you and your device could potentially be vulnerable to all sorts of risks.
  • With more connected “things” entering our homes and our workplaces each day, it is important that everyone knows how to secure their digital lives.

SIMPLE TIPS TO OWN IT

  • Shake up your password protocol. Change your device’s factory security settings from the default password. This is one of the most important steps to take in the protection of IoT devices. According to NIST guidance, you should consider using the longest password or passphrase permissible. Get creative and create a unique password for your IoT devices. Read the Creating a Password Tip Sheet for more information.
  • Keep tabs on your apps. Many connected appliances, toys, and devices are supported by a mobile application. Your mobile device could be filled with apps running in the background or using default permissions you never realized you approved—gathering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and learn to just say “no” to privilege requests that don’t make sense. Only download apps from trusted vendors and sources.
  • Secure your network. Properly secure the wireless network you use to connect Internet-enabled devices. Consider placing these devices on a separate and dedicated network.
  • If you connect, you must protect. Whether it’s your computer, smartphone, game device, or other network devices, the best defense is to stay on top of things by updating to the latest security software, web browser, and operating systems. If you have the option to enable automatic updates to defend against the latest risks, turn it on.

Next Steps For You

Now that you’re more aware of protecting what you are connecting, the next step is to sharpen your security skills, either for upskilling or with the idea of starting a new career. Babbage Simmel’s Comprehensive NIST Cybersecurity Framework (NCSF) Training & CompTIA CySA+ Cybersecurity Analyst Certification Cybersecurity training options will equip you with the skills needed to become an expert in the security field. You will learn comprehensive approaches to protecting your infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud-based security, achieving compliance and much much more.

Questions about Cybersecurity?  Get in touch!

Oct 15th

5 Ways to Be Cyber Secure at Work


Businesses face significant financial loss when a cyber attack occurs. According to the Identity Theft Resource Center, in 2018, the U.S. business sector had the largest number of data breaches ever recorded: 571 breaches. Cybercriminals often rely on human error—employees failing to install software patches or clicking on malicious links—to gain access to systems. From the top leadership to the newest employee, cybersecurity requires the vigilance of everyone to keep data, customers, and capital safe and secure. #BeCyberSmart to connect with confidence and support a culture of cybersecurity at your organization.

SIMPLE STEPS TO SECURE IT

  1. Treat business information as personal information. Business information typically includes a mix of personal and proprietary data. While you may think of trade secrets and company credit accounts, it also includes employee personally identifiable information (PII) through tax forms and payroll accounts. Do not share PII with unknown parties or over unsecured networks.
  2. Technology has its limits. As “smart” or data-driven technology evolves, it is important to remember that security measures only work if used correctly by employees. Smart technology runs on data, meaning devices such as smartphones, laptop computers, wireless printers, and other devices are constantly exchanging data to complete tasks. Take proper security precautions and ensure correct configuration to wireless devices in order to prevent data breaches.
  3. Be up to date. Keep your software updated to the latest version available. Maintain your security settings to keeping your information safe by turning on automatic updates so you don’t have to think about it, and set your security software to run regular scans.
  4. Social media is part of the fraud toolset. By searching Google and scanning your organization’s social media sites, cybercriminals can gather information about your partners and vendors, as well as human resources and financial
    departments. Employees should avoid oversharing on social media and should not conduct official business, exchange payment, or share PII on social media platforms. Read the Social Media Cybersecurity Tip Sheet for more information.
  5. It only takes one time. Data breaches do not typically happen when a cybercriminal has hacked into an organization’s infrastructure. Many data breaches can be traced back to a single security vulnerability, phishing attempt, or instance of accidental exposure. Be wary of unusual sources, do not click on unknown links, and delete suspicious messages immediately. For more information about email and phishing scams see the Phishing Tip Sheet.

Next Steps For You

Now that you learned 5 ways to be cyber safe at work, the next step is to sharpen your security skills, either for upskilling or with the idea of starting a new career. Babbage Simmel’s Comprehensive NIST Cybersecurity Framework (NCSF) Training & CompTIA CySA+ Cybersecurity Analyst Certification Cybersecurity training options will equip you with the skills needed to become an expert in the security field. You will learn comprehensive approaches to protecting your infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud-based security, achieving compliance and much much more.

Questions about Cybersecurity?  Get in touch!