Stay Secure in 2018
Even when we’re extra vigilant with security measures, we can’t always protect against every threat. If your system gets compromised with crypto ransomware, there are ways to detect it early and minimize the impact. Check out Michal Ziemba’s tips.
If a cyber attack occurs, would you be ready? Member and expert btan goes through the ITIL incident management framework to help you design an incident response plan in case the unthinkable happens. Follow the guideline here.
Remote employees are becoming the norm, and this can pose an increased risk to company data and devices. Check out how a DevOps worker secures both remote employees’ devices and company information, even when located across the country. Read Now.
Many people choose to use DropBox as a virtual backup to their personal devices, but that means they’re at an increased risk for hacking and for losing all their stored data. Member and expert Andrew Leniart offers his tips for keeping your DropBox locked down. Check out his tips.
Net Neutrality: What to Expect
Opinion: Net Neutrality Repeal
Last month, the FCC voted to repeal Title II, the framework supporting net neutrality across all broadband ISPs. We sat down with Doug Walton, database administrator at Experts Exchange and supporter of net neutrality, to gauge his opinion of what will happen next. Read his opinion.
In July, before the Internet-wide Day of Action in support of Net Neutrality, Gene Richardson shared some history on the regulation and why a neutral, open internet matters to us. Here’s his viewpoint.
A Look at What Lies Ahead for Tech
The microchip has made leaps and bounds since its creation back in 1965. Today’s technologies, like cloud computing, have likely surpassed what early experts envisioned. Member Ryan Ayers dives into future predictions for today’s leading technologies. Read it here.
A New Year for Design
With the rise of custom Android app development for business, there is a correlating need for individuals well-versed in how to successfully build and deploy these apps to the masses. Find out how custom Android apps can make a difference for your company and why you should learn this skill. Learn more.
With the rise of products like Amazon Alexa and Google Home, developers need to consider voice commands and conversational qualities when developing and testing their products. Member Nishtha Singh details what to look for here.
If you work in the B2B world, chances are your website will be due for improvement in 2018. Member and designer Lexie Lu outlines the top 5 upcoming trends for B2B website design in the new year. View it here.
InfoSec Risks in 2018
- Brought to you by KnowBe4
One of the first things hackers try is to see if they can spoof the email address of someone in your own domain. KnowBe4 can help you find out if this is the case with our complimentary Domain Spoof Test. Find out now if your email server is configured correctly, many are not. Try to spoof me!
- Brought to you by AlgoSec
A review of 2017, a year where data breaches increased in number and severity and where many big-name companies and organizations fell victim. The year when attacks on IoT systems were rife, including many Botnet attacks, and businesses scrambled to gear up for the GDPR which will come into force in May 2018. By looking back, IT teams can take steps to prevent these events from repeating in the future. Read more of Prof. Avishai Wool’s review here.
Want to know the top 5 solutions of 2017? Well this year, have a hand in voting for your favorites. This poll lists the top 15 solutions ranked according to views. Vote now!
Top 5 Posts
Ready for a deep understanding of the advanced formulas and functions that transform Excel from a basic spreadsheet program into a dynamic and powerful analytics tool? Get started today!
Learn the basics of PowerShell and start writing your own code instead of downloading random scripts from the internet. Register now.