Use your computer fearlessly.




Mission Services Articles Research





everyone: older news

business: Intractable Cybersecurity, Quantum Communications


Technology Debt

by Brent Kirkpatrick

(Date Published: .)



Technology debt effects your bottom line.



You have installed a large network. After becoming accustom to the continuous maintenance, your organization came to rely for years on the reliability of the network. Then your accounts recorded an increase in the maintenance costs. The network and computers were failing.

Your whole team was bewildered and your IT people had no explanation beyond the failures themselves. You noticed the effect on the bottom line and started to call this technology debt. You and your team began to discuss migration to new systems from the legacy systems. The devils advocates pointed out that there was nothing apparently wrong with either the hardware or the software of the legacy systems.

cartoon: increasing IT costs as security worsens

These problems are cybersecurity problems. These problems are symptoms of your network being under attack. Vulnerabilities under active exploit can explain these types of problems. A vulnerability is several lines of computer code that can be exploited by hackers. Hackers use vulnerabilities to gain access to your network and computers. Then they steal data, destroy data, or disable computers.

Software systems that function well during development and during the first year of service do not break suddenly without outside intervention. When multiple computers have software that starts breaking, data that is stolen or destroyed, and systems that are partially or completely disabled, these are symptoms of hacking.

Please contact us at Intrepid Net Computing if you need solutions to cyberattacks.


Trojan Hunter image

Trojan Hunter (TM). Digital forensics for Trojans at an accessible, fixed price. For any operating system.




Business Articles

Network Attack Surface

Infrastructure Security

What is Wrong with Cyberinsurance?

Computer Security is Algorithmically Intractable

New Technologies for a New Cybersecurity Marketplace

Why Clean-Up Hacking?







INC Logo




What Is New? | Contact | Tips


© 2015-2023 Intrepid Net Computing. All rights reserved.