Don’t oversecure your network: Why NOT to ban BYOD
After years of standing alone atop my network security soapbox, I find myself in an unusual position. I’ve noticed that the discussion about cybersecurity has
After years of standing alone atop my network security soapbox, I find myself in an unusual position. I’ve noticed that the discussion about cybersecurity has
Recently I’ve seen some negative press concerning Virtual Desktop delivery. It’s been interesting to see the source of the negativity behind some of the press.
I have scheduled countless meetings with bank presidents, CEOs, COOs, and CFOs over the past several years since I started representing my company as director
We’ve offered you a behind-the-scenes look at a remote engineer’s workstation in our IT helpdesk support center. Our helpdesk technicians want to resolve problems quickly,
(Part 1: Introduction) Cisco introduced its ASA firewall (adaptive security appliance) in May 2005 as a multifunction firewall and intrusion-prevention device. In the decade since
Charging clients $0 per hour sounds downright crazy, and crazy is what it is. But some of you are doing it. Ask yourself this question:
Restrict Data Input with Excel’s Data Validation Tool When creating Excel spreadsheets for others to use, you may wish to compel users to type in
If Pinterest boards are any indication (or Forbes, or CIO.com), America loves to see pictures of office workspaces. Cluttered desks tangled with high-tech gadgetry, sleek
Ask an executive at most small businesses about cybersecurity, and the rest of the conversation is predictable. The first question they’ll ask is, “Should we