Social Media and Blogging



Working Remotely

Best Practices for Working Remotely

Kent Gartside 0 362 Article rating: 5.0

If you're working remotely you want to be prepared with the right tools to keep you productive and efficient.  In this Article I will identify some best practices and key points to consider in your Standard Operating Procedures for Telecommuting or Working Remotely.

Everyone is Going to the Cloud

Is the Cloud the right move?

Kent Gartside 0 388 Article rating: 4.0

Rushing to the Cloud can sometimes be a mistake and cost organizations a lot of money.  Knowing if the Cloud is a right move before you make it, can be very valuable.

Pwned or Owned?

Who has my information?

Kent Gartside 0 386 Article rating: 5.0

Pwn or pwned comes from the verb to own or meaning to conquer or gain ownership.  In the case of being pwned online, it typically means  the hacker has your credentials to a Web site that has been hacked at some point.

What does it mean if I've been pwned?

Being pwned means that a hacker has your credentials to a Web site that you've once subscribed to.  For example, Adobe: In October 2013, 153 million Adobe accounts were breached with each containing an internal ID, username, email, encrypted password and a password hint in plain text.  Compromised data: Email addresses, Password hints, Passwords, Usernames.

Protecting Your Organization from a Security Breach

Firewalls are an important key to protecting your network, but what about protection your network from your own users?

Kent Gartside 0 410 Article rating: 5.0

This Blog discusses the potential risks companies have when users have too much control or leeway within the organizations network system.  This document will outline key practices that will help minimize a security breach within your organization.

We have heard over and over again from the news media and leading experts that anti-virus software and “paying attention to what you’re clicking on” will greatly minimize the risk of being hacked.  Although, these things are important, they are far from what is really needed to protect your organization from a security breach.


Theme picker