Blog

Delicious content for your skill-up pleasure.
Exploring the Importance of IT Policies

Exploring the Importance of IT Policies

In last week's post, Exploring 3 Different Types of IT Documentation, we briefly touched on policies as one of the three common types of documentation. The importance of IT policies cannot be overstated. Policies are very important as they portray an organization's...

read more

Many recommendations across the Net sound like this: ‘Don't keep your information on the cloud.' Fair enough, but it's the same as if you asked, ‘How not to get my house burned down?' and the answer would be, ‘Do not have a house.' The logic is solid, but a better way to translate such advice is, ‘avoid storing sensitive information on the cloud.' So if you have a choice you should opt for keeping your crucial information away from virtual world or use appropriate solutions.

Read more

Victoria Ivey on Cloud Logic

Quote by Victoria Ivey, CIO.com

read more

Whether you're traveling with a laptop, netbook, smartphone, iPad, or all of the above, the risks and defenses against them are basically the same.

Read more

Joe Nocera on Traveling

Quote by Joe Nocera, Partner at PricewaterhouseCoopers

read more
Cloud Computing Service Descriptions

Cloud Computing Service Descriptions

As test day for the Security+ SY0-401 approaches, I thought it would be good to include a few cloud computing service terms for review. PaaS - Platform as a Service This service is for users who want some control in their hosting or development Reduces the need for...

read more
Security Introduction: Security Acronyms

Security Introduction: Security Acronyms

Even at the general level, you need to know many acronyms to work in IT. Transitioning into security is no different. You'll most likely come across these security acronyms in news articles and whatever studies you may be engaged in. Acronym Meaning 3DES Triple...

read more

A business will have good security if its corporate culture is correct. That depends on one thing: tone at the top. There will be no grassroots effort to overwhelm corporate neglect.

Read more

William Malik on Security Culture

Quote by William Malik, Vice President and Research Area Director for Information Security at Gartner

read more

I think the insistence on credentials at companies is such a huge mistake. I believe you should hire people based on who they are and what they've done, not because of something like what college they went to–or even whether they went to college. It turns out, the rigor that college requires often screens out the most creative people anyway.

Read more

Nolan Bushnell on Credentials

Quote by Nolan Bushnell, Co-founder of Atari

read more

Categories

Archives

Merged Projects

Helping you study and earn IT and security certifications. Stick around for what comes next, the job!

You're your own best tech. Learn the basics of IT troubleshooting here.

Helping you raise your income when you're underpaid and underappreciated so you have more money to reinvest in yourself.

Pin It on Pinterest