What Your IT Guy Wishes You Knew About Social Media Privacy

To many of us, social media is second nature. We wake up and immediately check Facebook, Instagram and Twitter only to check it all again before even thinking about closing our eyes for bed. Social media is an integrated part of our lives, making it easy to overlook the security concerns it can bring, not only to ourselves but also for the organizations we work for. The privacy settings on these social channels are regularly overlooked, opening the door to strangers following our personal status updates, photo shares and work information.

Read more

How To Build Your Own Cybersecurity Team

The U.S. Department of Labor expects employment of “Information Security Analysts” to grow by 37 percent from 2012 to 2022, or more than twice the rate of all “computer occupations,” which are themselves expected to grow 60 percent more than “all occupations.” In other words, if you are an information security analyst or studying to be one, then you are looking at rapidly growing demand for your services. Your future is likely to be very bright.

Read more

The Difference Between Fights and Arguments

Fights and arguments — two words that are used synonymously but could not be further apart. We all know that a fight is a disagreement based not on rational thought but rather on an emotional position. Fights, filled with gainsaying, fallacious thinking and emotional hijacking seldom do anyone any good. Argumentation, on the other hand, is reason giving. Argumentation, the gateway to effective reasoning, is an essential skill for any business-systems analyst. But what is argumentation?

Read more