Theft of Podesta’s campaign emails—3 tipoffs to avoid having YOUR email hacked
Hillary Clinton’s 2016 campaign for President put email security on the forefront of the news for much of the year. In addition to the big
Hillary Clinton’s 2016 campaign for President put email security on the forefront of the news for much of the year. In addition to the big
Scam Of The Week: Locked PDF Phishing Attack SANS Internet Storm Center warned about an active phishing campaign that has malicious PDF attachments in a
Two recent Technology OneSource case studies identify the challenges facing two chemical manufacturers and the steps taken by each company to resolve them. I.T. case
Lots of important security updates this week–including a great “top 10” list of cybersecurity predictions for 2017 and a list of the top 7 data
Millennials collaborate. If you want to retain them at your company, start to speak their language. That’s the central lesson of this fun new e-book
From a regulatory avalanche to outright disruption “First there was a loud crack, and then the avalanche came—a 100-foot-wide wall of rock-hard snow….” A witness describes
You Got Style! Microsoft Word is a style-based program. Designers have created endless Word styles to make life easier for Word users. Bullets are a
I’m the queen of analogies. When discussing technology in the workplace, I have to use analogies for my own mind, if nothing more. As a
We developed a Big Hairy Audacious Goal. We started daily huddles. We created a one-page strategic plan. We made a habit of the Rockefeller Habits.