Data Privacy Blog Series Part 1: Hello Tech, Good-Bye Privacy

Today’s technology and apps allow stalkers to easily track their victims’ whereabouts. Burglars can easily determine what valuables we possess and when we are not home. Hackers can use your personal information to create very believable email phishing attacks. They send you emails that trick you into clicking on links, responding, and providing more personal information or opening attachments and downloading malware. In order to protect ourselves and our businesses we must be able to recognize what information we are releasing, what is being collected, what is available and who has access to it.

Read more

Tech the Halls: Our Favorite Tech Gadgets this Holiday Season

2015 was the year for new, innovative tech gadgets and products. At Global Knowledge, we’ve patiently waited for the gift-giving season to get our hands on this year’s top tech. To aid in your hunt for the perfect present, to give or to get, Global Knowledge’s own tech-lovers have come together to create the ultimate gadget wish list. Check out our top picks this holiday season, ranked accordingly!

Read more