January Newsletter: Vote for the top 5 solutions of 2017

Published on
3,364 Points
Last Modified:
Experts Exchange
We connect you with people and information to solve problems, inspire learning and influence the future of technology.
Welcome to 2018! Exciting things lie ahead in the world of tech. To start things off, we compiled great member articles on how to stay safe, ways to learn, and much more! Read on to start your new year right.

Subscribe to Expert News

Stay Secure in 2018


Crypto ransomware attacks. How to prevent or spot the source?

Even when we’re extra vigilant with security measures, we can’t always protect against every threat. If your system gets compromised with crypto ransomware, there are ways to detect it early and minimize the impact. Check out Michal Ziemba’s tips.

What's in an Incident Response Plan?

If a cyber attack occurs, would you be ready? Member and expert btan goes through the ITIL incident management framework to help you design an incident response plan in case the unthinkable happens. Follow the guideline here.

8 Steps to Secure Remote Workers

Remote employees are becoming the norm, and this can pose an increased risk to company data and  devices. Check out how a DevOps worker secures both remote employees’ devices and company information, even when located across the country. Read Now.

Securing Your DropBox & Password Management

Many people choose to use DropBox as a virtual backup to their personal devices, but that means they’re at an increased risk for hacking and for losing all their stored data. Member and expert Andrew Leniart offers his tips for keeping your DropBox locked down. Check out his tips.

Net Neutrality: What to Expect

Net Neutrality

Opinion: Net Neutrality Repeal
Last month, the FCC voted to repeal Title II, the framework supporting net neutrality across all broadband ISPs. We sat down with Doug Walton, database administrator at Experts Exchange and supporter of net neutrality, to gauge his opinion of what will happen next. Read his opinion.

I Support Net Neutrality—And You Should Too

In July, before the Internet-wide Day of Action in support of Net Neutrality, Gene Richardson shared some history on the regulation and why a neutral, open internet matters to us. Here’s his viewpoint.

A Look at What Lies Ahead for Tech

Cloud Computing

A New Era of Computing Power: Cloud Computing and Innovations of the Future

The microchip has made leaps and bounds since its creation back in 1965. Today’s technologies, like cloud computing, have likely surpassed what early experts envisioned. Member Ryan Ayers dives into future predictions for today’s leading technologies. Read it here.

A New Year for Design


What Makes Custom Android App Development The Need of the Hour?

With the rise of custom Android app development for business, there is a correlating need for individuals well-versed in how to successfully build and deploy these apps to the masses. Find out how custom Android apps can make a difference for your company and why you should learn this skill. Learn more.

Voice-First Applications: A Few Software Testing Considerations to Take Into Account

With the rise of products like Amazon Alexa and Google Home, developers need to consider voice commands and conversational qualities when developing and testing their products. Member Nishtha Singh details what to look for here.

How B2B Web Design Will Change in 2018

If you work in the B2B world, chances are your website will be due for improvement in 2018. Member and designer Lexie Lu outlines the top 5 upcoming trends for B2B website design in the new year. View it here.

InfoSec Risks in 2018

Vendor Spotlights

Can Your Domain be Spoofed by Hackers?

- Brought to you by KnowBe4

One of the first things hackers try is to see if they can spoof the email address of someone in your own domain. KnowBe4 can help you find out if this is the case with our complimentary Domain Spoof Test. Find out now if your email server is configured correctly, many are not. Try to spoof me! 

Reflections on the State of Infosecurity in 2017

- Brought to you by AlgoSec

A review of 2017, a year where data breaches increased in number and severity and where many big-name companies and organizations fell victim. The year when attacks on IoT systems were rife, including many Botnet attacks, and businesses scrambled to gear up for the GDPR which will come into force in May 2018. By looking back, IT teams can take steps to prevent these events from repeating in the future. Read more of Prof. Avishai Wool’s review here.

Vote for the Top 5 Solutions of 2017 

Want to know the top 5 solutions of 2017? Well this year, have a hand in voting for your favorites. This poll lists the top 15 solutions ranked according to views. Vote now!

Top 5 Posts

  1. Currency-mining Malware: How to protect your Android Device - Thomas Zucker-Scharff
  2. Windows Cannot Access Shared Folders: How to troubleshoot this problem -  Abraham Deutsch
  3. iPad Pro or MacBook? Apple may replace macOS - Jackie Man
  4. Type-safe Class Builders: And in-depth look at the approach - A.E. Veltstra
  5. Introducing Google’s AR Stickers: Watch your photos transform - MASQUERAID

Excel Analytics: Advanced Formulas & Functions

Ready for a deep understanding of the advanced formulas and functions that transform Excel from a basic spreadsheet program into a dynamic and powerful analytics tool? Get started today!

PowerShell: A Getting Started Guide for IT Admins

Learn the basics of PowerShell and start writing your own code instead of downloading random scripts from the internet. Register now.

Announcing the 2017 Expert Awards! Keep an eye out for our February newsletter featuring our new winners. View previous winners here.


Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Join & Write a Comment

Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
From store locators to asset tracking and route optimization, learn how leading companies are using Google Maps APIs throughout the customer journey to increase checkout conversions, boost user engagement, and optimize order fulfillment. Powered …

Keep in touch with Experts Exchange

Tech news and trends delivered to your inbox every month