Sunday, August 1, 2021

Linda LeBlanc

So a Key IT Person Quit, Now What?

If you are small firm, your employees must bear multiple responsibilities. But you have had the wisdom to hire good IT personnel to keep the business running...

Top Five Security Threats for 2006

In anticipation of the new year ahead, I'd like to look at those things most likely to test our security patience. Let's talk about the Top Five...

When Data Spills, Who do You Notify?

So by now most of you know that a few weeks ago someone stole my backpack, which was holding my laptop, my PDA, my pager and my...

How do You Recover after a Stolen Laptop?

As I was driving to work a couple of weeks ago, I stopped at a neighborhood gas station to fill up since I'd be traveling over the...

End Users are Clueless — and it’s IT’s Fault

So we're all agreed: Malware can be hazardous to your health. We also agree that more and more exploits are being discovered every day in various software packages....

Fine Line Between a White Hat and Black Hat

I have a confession to make. I do not consider myself a 'white hat' in the common sense of the word within the technology community. Although, I...

Is Your Printer a Network Security Risk?

There's an old adage that goes: On the Internet, no one knows you're a dog. This has been rendered in terms of the dating pool, products being...

Beware the Mailman, the Phone Call and the Email

You know on the Internet you can be anyone you want to be, right? Anyone who has spent time playing online games, visiting dating Websites or online poker...

Protecting Your Identity and Your Network

Recently, while a colleague was visiting a top university, he experienced some difficulty getting on the network there. He approached a student in the library and asked...

Gates Misses the Mark, and the Point, on Security

Bill Gates wants us to believe security is Microsoft's new Number One priority. He wants us to believe they have the users' best interests at heart. I, personally,...

A Lost PDA puts Your Data in Danger

Have you seen my PDA? I have a confession to make... I'm really hard on personal electronics. In just over two years, I have eliminated two pagers,...

Protecting Data While Protecting Your Job

An acquaintance approached me with a dilemma recently. Her supervisor had requested the password of a coworker who was out on extended sick leave. The supervisor said,...

Latest Articles

CFOs Committing to Digital in...

STAMFORD, Conn. — More CFOs are planning to increase their spending on digital than any other part of the business in 2021. Eighty-two percent of...

SAP and IBM Partnering on...

WALLDORF, Germany and ARMONK, N.Y. — SAP and IBM are working together to help financial institutions accelerate cloud adoptions and “modernize operations.” SAP plans to...

Microsoft Releases Toolkit on Designing...

REDMOND, Wash. — Microsoft is offering guidance to companies to develop human-centered artificial intelligence (AI) technologies. Microsoft released the Human-AI eXperience (HAX) Toolkit or a...

Google Cloud and SAP Partnering...

SUNNYVALE, California and WALLDORF, Germany — Google Cloud and SAP are deepening their relationship to help companies tap into the cloud.  The expanded strategic partnership...