Teaching Others

Outsource to the Cloud

Jumping Into the Cloud

“If you fail to take responsibility for the control design and monitoring required in conjunction with your Cloud service software, you may face a cyber-attack. Your clients will blame you – no one else.” ~ Cheri Hotman What is “The Cloud”? We’ve all heard of ‘The Cloud’, but even its name is elusive. Details such […]

Jumping Into the Cloud Read More »

Basic Home Network Security for IoT Devices

Network Security for IoT Devices

IoT Devices We are living in deeply interconnected world. We are constantly adding doorbell cameras, smart thermostats, smart lights, a range of Amazon Alexa and Google Home compatible devices; in effect, countless smart IoT devices. "IoT without security = internet of threats" ~ Stephane Nappo Protecting Your Home Network and Family The era of IoT

Network Security for IoT Devices Read More »

The Real Threat of Ransomware

The Real Threat of Ransomware

The Threat of Ransomware Ransomware is the top cybersecurity concern facing your business today.  Ransomware is not only a threat to your business, but also a real threat to the technology infrastructure of your nation and the world. “If you have built castles in the air, your work need not be lost; that is where

The Real Threat of Ransomware Read More »

Control Your Focus in Information Technology

Control Your Focus

Control Your Focus and Move Mountains In Information Technology, there can be a lot to worry about from one day to the next.  Learning how to control your focus will largely determine how you and your colleagues view your success.  Positive focus and outlook will serve you in ways you can't begin to imagine. "That's

Control Your Focus Read More »