Data Security and Privacy Techniques for Everyone
06/17/20 Everyone on the internet should follow good data security and privacy practices. And when I say everyone, I mean everyone. IT pros aren’t the only people who need to prote…
06/17/20 Everyone on the internet should follow good data security and privacy practices. And when I say everyone, I mean everyone. IT pros aren’t the only people who need to prote…
06/16/20 Esports is soaring in popularity in K–12 schools and in higher education as student gamers find a competitive and team-based outlet for their video gaming habits—playing n…
06/11/20 In the previous blog, I discussed how IT risks can infiltrate the service desk if proper incident, problem, and change management aren’t applied. But, IT risk detection in…
06/09/20 The military has invested significant time and money implementing edge computing on the battlefield. The Army’s efforts to leverage the tactical cloud to process data on t…
06/02/20 In government, mobile devices are both embraced and resisted. The mobility and ease of use afforded by smartphones and tablets helps boost worker productivity even as they…
06/01/20 As we roll into the next decade and IoT becomes commonplace in most organizations, requirements for connectivity will change. Over the last decade of Wi-Fi, we’ve seen a p…
05/29/20 OK, folks. Let’s be real for a moment and acknowledge that everybody, every professional, and definitely every vendor out there is tossing out the phrase “IoT” like flyers…
05/28/20 A few weeks after I started with an insurance company as a rookie COBOL developer, Hurricane Katrina made landfall on the Gulf Coast and New Orleans. Because I worked for …
05/28/20 In life, risks can be perceived both negatively and positively. Taking a risk can sometimes yield great results, but other times, a risk is a yellow light of caution. For …
05/27/20 Have you ever had a colleague who waited year after year for a promotion that never came? Or worse, have you BEEN that person? You’re not alone. Many IT professionals are …
05/26/20 Careful monitoring and attention to endpoints are just two elements of a strong cybersecurity strategy for K-12 districts. Cybersecurity must be a top priority for K-12 sc…
05/25/20 I started in the IT industry in networking. I had a negative experience in high school trying to learn computer programming*, so I was relieved route/switch had much less …