Lieberman Technologies
banner
ltnow.bsky.social
Lieberman Technologies
@ltnow.bsky.social
3 followers 1 following 34 posts
A proactive, security-first IT services and software development company based in Evansville, Indiana and in business since 1977.
Posts Media Videos Starter Packs
We were very happy to have Stewart Klipsch, our former CEO, back in the office to celebrate his retirement last year. Thank you Stewart for your years of dedication to Lieberman Technologies, your ongoing guidance, & for setting us up on a great trajectory for years to come!

Enjoy your retirement!
We're grateful for every member of our incredible team, and are excited to celebrate the Q3 anniversaries of Clay Powell (15 years), Matt Presley (8 years), Patrick McIntosh (5 years), and Joseph Randolph (4 years)!
We're Hiring!

We're looking for an Accounting Specialist to join our team – if you or someone you know is looking for a new opportunity with a great local and employee-owned company, take a look here!

ltnow.com/about/career...
Any site or app that accepts user-submitted data, like comments or contact form submissions, could be susceptible to Cross Site Scripting (XSS) attacks used to steal users' data, accounts and worse.

#TechJargon101 #XSS #CrossSiteScripting #cybersecurity
Did you know every video, photo and file you share contains hidden information you might not realize you're sharing? Metadata is embedded in every file you create and can lead to unintentionally sharing confidential, sensitive or private information.

#TechJargon101 #Metadata #Files #Cybersecurity
Our team had a great time out at the Noah Robinson for Sheriff Golf Scramble at Cambridge Golf Course on Friday – we’re proud to sponsor and support the great work our Sheriff and all the deputies and staff are doing with the Vanderburgh County Sheriff's Office.

@vandsheriff.bsky.social
JPG is no longer the king of the hill when it comes to images on the web – developed by Google as a more modern file format, WebP offers great image quality and more features, all at a reduced file size.

#TechJargon101 #WebP #ImageFormats #Optimization #WebPerformance
We can't rely on tools that only recognize known threats, instead we need to detect & react to suspicious behavior – that's where EDR, or Endpoint Detection & Response comes in, allowing IT teams to protect against even novel cybersecurity threats.

#TechJargon101 #EDR #Networking #Cybersecurity
An anchor tag is a great browser feature that enables direct linking to content deep within a webpage, which is especially useful for pages with lots of content. Learn more in today's Tech Jargon 101.

#TechJargon101 #Browsers #WebBrowsers
Our team had a great time out in support of HOPE of Evansville at their golf scramble on Friday, August 29th – we didn't break any records, but we might have if we could have used the golf ball cannon on every hole!
Join us for a free Cybersecurity Roundtable Lunch-and-Learn event on Thursday, October 23, featuring a panel of tech leaders from the Evansville region across several industries.

We'll be announcing our panelists soon & you can register at LTnow.com/roundtable.

Spots are limited so register today!
Domain controllers are a central component of corporate networks, being responsible for authentication, authorization, policy enforcement and directory services for all devices and resources. Learn more in today's Tech Jargon 101.
#TechJargon101 #DomainController #Networking #Cybersecurity
Most data shared between online services is transmitted in a format called JSON, which is easily readable by both humans & computers. JSON is ubiquitous across the web, allowing easy interoperability between tools and services.
#TechJargon101 #JSON #Data
SSL Certificates are like IDs for services on the Internet, helping to ensure your data stays secure when transmitting between devices. Learn more in today's Tech Jargon 101.

#TechJargon101 #SSL #TLS #Internet #Technology
DNS Zones are how domains are organized and managed, allowing all the various organizations and administrators the level of control they need, from the root of the domain name system, all the way down to individual domains and subdomains. Learn more in today's Tech Jargon 101.

#TechJargon101 #DNS
Nearly every device on a corporate network creates detailed logs with vital information that can be used to detect threats, but that information is much more useful when aggregated with logs & events from all the devices in a network.

#TechJargon101 #SIEM #NetworkSecurity
International standards are incredibly important with technology that's developed, manufactured and used across the world, and ISO has published more than 25,000 standards across many industries.

#TechJargon101 #Technology #Standards #Standardization #International #interoperability
You're certainly already familiar with the ubiquitous term "Wi-Fi", but did you know it's just a made up marketing term, piggybacking on the familiarity of the longstanding term "Hi-Fi"? Learn more in today's Tech Jargon 101.

#TechJargon101 #Wifi #WirelessNetworking
Botnets can take over more than just PCs – they can infect any vulnerable internet-connected device, including printers, cameras, kids toys and more, turning those devices into a tool for cyberattacks.
#TechJargon101 #Botnet #Security #Internet #Cyberattack #IoT
We're grateful for every member of our incredible team, and are excited to celebrate the Q2 anniversaries of Paul Schwake (24 years), Jeremy Payne (23 years), Kim Rust (9 years), Brian Burkett (7 years), Dustin Koenig (6 years), David Braun (5 years) and Josh Quirey (5 years)!
Wonder how cybercriminals take down large websites and online services? DDoS attacks are one of the techniques they use – a brute force method to crash sites by flooding them with an overwhelming amount of Internet traffic.

#TechJargon101 #Cyberattack #Cybersecurity #DDoS
Computers need a common language to speak to eachother, just like people. Protocols, and the handshake that occurs between systems to determine which to use, set the groundwork for all digital communications.

#TechJargon101 #Networking #DigitalCommunications
APIs serve as the connective tissue between applications and services on your devices and on the Internet, and let software developers drastically expand the functionality they can deliver for users.
#TechJargon101 #API #Software #Development #Integration
A port in computer networking is like the suite number of a building – it let's you target a specific application running on a computing device just like you'd address a package to a specific business's suite number at its building address.

#TechJargon101 #Networking #ComputerNetworking
Want to look like an elite hacker? Start working with the CLI, or command-line interface, and utilize the hidden power of command-line utilities, enabling advanced scripting, automation and remote management capabilities.
#TechJargon101 #CLI #Programming #Scripting #CommandLine #RemoteManagement #IT