How To Build Your Own Cybersecurity Team

The U.S. Department of Labor expects employment of “Information Security Analysts” to grow by 37 percent from 2012 to 2022, or more than twice the rate of all “computer occupations,” which are themselves expected to grow 60 percent more than “all occupations.” In other words, if you are an information security analyst or studying to be one, then you are looking at rapidly growing demand for your services. Your future is likely to be very bright.

Read more

The Difference Between Fights and Arguments

Fights and arguments — two words that are used synonymously but could not be further apart. We all know that a fight is a disagreement based not on rational thought but rather on an emotional position. Fights, filled with gainsaying, fallacious thinking and emotional hijacking seldom do anyone any good. Argumentation, on the other hand, is reason giving. Argumentation, the gateway to effective reasoning, is an essential skill for any business-systems analyst. But what is argumentation?

Read more

C-Suite and Techies: Minimizing End User Errors

Security is an essential business responsibility. For the typical organization, at least half of the violations of the security policy are from internal personnel. While most of those violations are mistakes or errors caused by ignorance, some are performed intentionally and maliciously, against the company, other employees — or even customers. For a top executive, reducing these violations is crucial to maintaining a growing business. For an IT manager and/or security manager, reducing these violations is important to prevent downtime and improve efficiency. Fortunately, there are many steps that can be taken to help reduce end-user security violations. Most of these solutions are a combination of technology and training. And they are designed to address specific situations. These ideas might not address every issue occurring in your organization, but you are likely dealing with a majority of these concerns.

Read more