SandStorm IT
Latest Posts from Our Blog
Welcome to SandStorm IT’s 6-part series about the Internet of Things. In this series, we’ll shed some light on the basics of IoT. Part 1 – What is the Internet of Things (IoT)? (You are here) Part 2 – Why do I care about IoT? Part 3 – What are some real-world applications of IoT? Part…
Read MoreA Denial of Service (DoS) attack is an attack on an individual computer or network that aims to consume as many resources as possible. The main goal of this attack is to deny service to the legitimate users of the computer or network. There are a number of ways in which this can be accomplished,…
Read MoreAs mentioned in Part 1 of this series, we could provide you with hundreds of Google tips instead of just five, so here are five more to get the most out of Google, the most popular site on the Internet (Source: alexa.com). Get More Relevant Search Results When you search for multiple words, oftentimes Google…
Read MoreWhat is HIPAA? HIPAA is the Health Insurance Portability and Accountability Act of 1996 that was enacted by Congress and signed into law in 1996. There are many provisions to HIPAA covering many items mostly dealing with health insurance and regulations on what can be offered and how. Additionally, HIPAA also details regulations about a…
Read MoreIf you’ve used a computer anytime over the past 20 years, you’ve probably been infected by a virus, malware, or some other malicious piece of software. You may have been lucky and been able to get it cleaned off without much trouble or maybe you weren’t so lucky and lost data. Think about today, what…
Read MoreProgramming. To some, it’s an art where, with a few (thousand) keystrokes, magic can happen. To others, it’s a job that can pay lots of money. Many call it the future, with hundreds of programs and gizmos designed to teach programming to children and thousands of people seeking retraining or education to enter the field.…
Read MoreAs a busy parent, professional or retiree, we all take security seriously in some respects. How many of us leave our homes without closing or locking the door? How many of us leave our keys in the car when visiting a restaurant? I suspect the number of people who take such a relaxed approach to…
Read MoreData Hashing. Encryption. These are words that one hears all the time about the topic of security. Sometimes, they are used interchangeably when they are different things despite both being critical to security. In this blog post, we will explain both and also explain how they can be used in conjunction to achieve a higher…
Read More