How is Cloud Security Different?
Security is different with cloud services, but if you know how it operates, you can take advantage of these great services, the savings, and the ease of doing business.
by John Collier on June 11, 2015
For the casual user, bugs and security gaps are an inconvenience, perhaps even a nuisance. For the enterprise, these issues can be catastrophic. What does your IT help desk need to consider doing about it? Perhaps it's time to stop waiting on the giants to fix their stuff and begin developing security measures in house.
by John Collier on May 5, 2015
More than perhaps any other department, IT still has difficulty proving the potential ROI for IT service management, and indeed, any IT related expenditure. Sometimes the monetary return on investment is far removed from the expenditure, making it hard to prove to executives what the real value or potential value is. Here is your guide to making your case for IT service management.
by John Collier on April 22, 2015
Social engineering is a broad term encompassing the many non-technical methods attackers use to gain access to information or systems. Why use brute force to crack passwords when you can charm someone into giving them up?
by John Collier on April 2, 2015
Have you ever been watching your favorite old movie and thought, "that guy sure could use a cell phone," or, "she really needs to Google this stuff"? What if you could go back and endow your favorite character with modern technologies like social media, the cloud, and mobile technology?
by John Collier on February 27, 2015
Discovering E.T. buried in the desert, and hackers posed as appliances. That's the stuff that used to define the likes of wildly imaginative thinkers is now reality. And you thought some of the help desk tickets your IT team gets are strange. Here are some of the latest bizarre tech stories.
by John Collier on January 23, 2015