If your bank supports it, you would do well to consider Virtual Credit Card numbers for online purchases. I was looking around for some good articles that discussed potential pitfalls or problems and found this gem of an article. Suffice it to say, that the best part...
If there is one lesson that technologists need to understand in order to be successful, it’s that business is ultimately more about people than about process or technology. At the end of the day, how people think, behave and operate will have be the greatest...
A holistic approach to information security needs to address a corporate strategy for buying or building solutions. Such a strategy will have an impact on how a company looks at staffing and technology investments. There are two basic ways to look at major investments...
In 2012, the writers of malware and the attackers of networks were very busy, using both social engineering and increased technical sophistication to fuel an increased number of attacks. Not incidentally, mobile devices just flew off the shelves this year,...
If you’re going to make use of cloud-based storage, it is a good idea to ensure that you keep it secure. Unless you are absolutely, positively certain that you will never, ever put anything in there that you wouldn’t want to find in a public place, you’re going to...
Doesn’t everyone want to be a consultant? Probably not… There are some clear advantages to working for yourself, and there are some clear disadvantages. Likewise, there are some PROs and CONs of working for someone else, and it for each person to determine for...