Resources

Blog

What is Spear Phishing in Cyber Security?

What is Spear Phishing in Cyber Security?

Since the early days of the internet, hackers and cybercriminals (otherwise known as bad actors or threat actors) have taken advantage of innocent people and talked them out of their hard-earned money and personal data. What started as generic Nigerian prince email...

What is Hashing in Cyber Security?

What is Hashing in Cyber Security?

Hashings and hash values are essential in cybersecurity and cryptography, allowing computer science professionals and IT experts to determine if two files are identical or reveal if a file is a threat. Understanding what hash functions are and the importance of hash...

In-House vs. Managed IT Support

In-House vs. Managed IT Support

More businesses than ever are going online. Having an IT professional on hand is crucial to ensure everything runs smoothly. Choosing between an in-house IT professional and managed IT service can be challenging, as they each have their own set of pros and cons....

News

CEG 21st Annual Technology Awards

Craig Skevington, Ph.D., Founder, CEO & President, STEADFast IT receives the Jeffrey A. Lawrence Lifetime Contributor Award from the Center for Economic Growth @ the 21st Annual Technology Awards. On the evening of June 29th, 2017 Craig Skevington was recognized...

The Tech Behind a $28 Million Renovation

From heated sidewalks to heated toilet seats, check out all the tech in this $28 million Saratoga Springs hotel.When guests at the new Adelphi Hotel in Saratoga Springs, New York, enter their rooms for the first time after checking in, they are greeted to a warm room...