The term hacker has been misconstrued over the years. A hacker is not generally one who breaks into systems. The…
Many organizations use in-house web applications and intranet sites for their production software and data sharing. Sysadmins know to install…
Whether it is through an email, a phone call, or face to face interaction social engineering attacks comprise a form…
Elk Cloner was the first virus written specifically for a Mac OSx. It was particularly designed for Apple DOS 3.3.…
The Internet is like an onion. (No, pun intended.) When one opens their browser to search Google, Yahoo, or MSN,…
Ransomware is a blanket term used to describe a class of malware that is used to digitally extort victims into payment…
When implementing social media technologies, one may encounter compliance issues such as privacy laws, content ownership, and intellectual property infringement.…
The effectiveness of on-site verses off-site web analytics is measured upon the goals of the web analysis. It will not…
Segregation of Duties and Dual Control is just as important in IT as it is in accounting. One person should…
People are the greatest threat to security. IT Risk Management is a career path in itself. Quite often, a basic…
