Tag Archives: Business

BYOD – Should family members use the device?

BYOD (Bring your own device) is a great concept and it can work.  I recently read an article on an opinion that made mereally think of how some look at this concept and its security as though the IT pros … Continue reading

Posted in Computers | Tagged , , , , , , , , | Leave a comment

FBI Credit Card Ring Bust Exposes PCI Challenges – Dark Reading

Some experts say existence of complex credit card fraud black market a sign that PCI isn’t effectiveFBI Credit Card Ring Bust Exposes PCI Challenges – Dark Reading.

Posted in Computers | Tagged , , , , | Leave a comment

Privacy hackers | Homeland Security News Wire

The U.S. Federal Trade Commission (FTC) has charged two businesses with illegally exposing the sensitive personal information of thousands of consumers by allowing peer to peer file-sharing software to be installed on their corporate computer systems…Privacy hackers | Homeland Security News Wire. The … Continue reading

Posted in Business, Computer Security, Computers | Tagged , , , , , , , | Leave a comment

A graph that shows how websites connect and how data can be collected

Just saw a student’s post on an add-on you can get for Chrome.  Adam shared a link to Collusion for Chrome at Chrome’s webstore.  This add-on compiles information from the websites that bind to one another and builds a graph … Continue reading

Posted in Computers | Tagged , , , , , | Leave a comment

Just click away – it’ll be ok…

Here’s 10 things the younger generation is doing online and how they can stop behavior that can lead to malicious theft of data and great food for thought about their online reputation. 10 things Gen Y do online.. and shouldn’t.  … Continue reading

Posted in Computers | Tagged , , , , , , , , , , , , , | Leave a comment

Generation Y Won’t Listen To IT

The latest generation of desk-jockey’s admitted in a recent CISCO study that they frequently ignore and/or circumvent the information technology (IT) policies of their employers, heightening corporate risk. The ISCO Connected World Technology Report surveyed some 2,800 college students and young … Continue reading

Posted in Computers | Tagged , , , , | Leave a comment

The Three Most Frequently Attacked Mobile Devices

“iPads pose the worst risk as far as data leakage in concerned since they are mainly used for consumption of enterprise information in various form of documents,” says Guy Levy-Yurista, vice president of products and development for AirPatrol. “This sensitive … Continue reading

Posted in Business, Computer Security, Computers, Education, Hacking, Health, Information Technology, network, Networking, Technology, Wireless | Tagged , , , , , , , , , , , , , , | Leave a comment

Now hiring: companies move away from outsourcing to control their IT destiny

The tight IT jobs market and desire for more control over tech projects has many companies insourcing  projects and growing internal staff. via Now hiring: companies move away from outsourcing to control their IT destiny.

Posted in Business, Computer Security, Computers, Health, Information Technology, Internet, Medical, network, Networking, Organizations, Technology | Tagged , , , , , , , , , , | Leave a comment

Compliance Outside Corporate Walls – Dark Reading

Getting third parties that touch regulated data to comply can be as important as your own internal compliance efforts. Compliance Outside Corporate Walls – Dark Reading.

Posted in Computers | Tagged , , , , , , , | Leave a comment

Keep your mind on track with MindOnTrack

Here’s a great program that allows you to enter tasks and use dozens of tags to prioritize, schedule and make into an easy to see graph.  MindOnTrack  

Posted in Computers, Information Technology, Networking, Software, Technology | Tagged , , , , | Leave a comment

Steve Jobs was a leader

Steve Job’s should be remembered as one of America’s greatest leaders of industry.  Apple’s fame and fortune is because of this great leader.   Little known to most, Bill Gates and Steve Jobs were not just competitors – they were … Continue reading

Posted in Computers | Tagged , , , , , , , , | 1 Comment

Lenovo ThinkPad Tablet Puts Business First

Lenovo’s new ThinkPad Tablet flips the “consumerization of IT” paradigm by adding business-class capabilities, says eWEEK Labs analysts. Features include management software, full-size peripheral connectors and an optional digitizer pen. The 10.1-inch Android device offers an Nvidia Tegra 2 dual-core … Continue reading

Posted in Computers | Tagged , , , , , | Leave a comment

10 Ways to Give Your System Administrators a Break – Security – News & Reviews – eWeek.com

10 Ways to Give Your System Administrators a Break – Security – News & Reviews – eWeek.com. System administrators have a difficult job. They have to keep track of what users are doing, what applications are running and what information … Continue reading

Posted in Business, Computers, Information Technology, network, Technology, Wireless | Tagged , , , | Leave a comment

U.S. Dept. Of Commerce Calls For Online Code Of Business Conduct

The Department of Commerce’s Internet Policy Task Force released a proposal Wednesday calling for a voluntary code of conduct for companies that do business online. The Report, titled Cybersecurity, Innovation and the Internet Economy, calls for a private-public partnership to … Continue reading

Posted in Computers | Tagged , , , , , | Leave a comment

Create Fillable PDF Forms

FillAnyPDF allows you to upload (using https) any PDF and create forms that are fillable.  With many PDFs to chose from, FillAnyPDF allows you capture an electronic signature while keeping your information secure. Any PDF may be used regardless of … Continue reading

Posted in Computers | Tagged , , , , , , , , , , , | Leave a comment

FortiClient Security Suite – Free Antivirus Software

FortiClient Security Suite Review  – An application that is listed on the web as free often lacks features an benefits to downloading the software.  FortiClient offers a full service package that CAN legally be used by home users, and ANY … Continue reading

Posted in Technology | Tagged , , , , , , , , , , , , , | Leave a comment

Cloud Based version of Microsoft Office

For the last several months, I have tried not to troll and ‘copy’ my fellow bloggers.  Being in an educational institution, the resource of information that comes from these industry experts has to be recognized.  Our school stays ahead of … Continue reading

Posted in Technology | Tagged , , | 1 Comment

Free Web Conferencing

Go Live Room offers a free service for users to share and hold internet conferences. Free Services Presenter and Attendees can use the following free services and any time. •  Free, One Click Webinars •  Audio and Video Sharing • … Continue reading

Posted in Technology | Tagged , , , , , | Leave a comment

Where the Jobs Are

Check out this interactive map showing job demand by trade.  Link With different trades and skills listed, you can adjust the chart as needed. Example Chart

Posted in Technology | Tagged , , | Leave a comment

Free Online Security Course for Home and Business Users

This online course is free to home and business users.  Users may obtain a certificate after taking a 100 question exam for a small fee.  Link The course is sponsored by the FBI’s Infragard and the Center for Information Security … Continue reading

Posted in Technology | Tagged , , , | Leave a comment