How to Bypass Your Best Computer Security System in Ten Minutes

In the time it takes you to read this short article, an intruder can create 3-5 user accounts within your business system. Social engineering is a technique hackers use to take over an account by persuading or psychologically manipulating people to divulge confidential information. This is usually the first step within a more complex scheme.Read… Read more »

“What’s Your Leadership Style?” “Basically Immature.”

Once in a job interview a senior executive leaned forward, and asked THE question. “So tell me, Dannielle…what would you say is your leadership style?” I looked at her. I looked at the group. I couldn’t take how serious they were. I mean for goodness sake, we weren’t negotiating Middle East peace here. “Basically immature,”Read… Read more »

Mobile App Threats to Your Organization at the Code

In today’s computing environment, we have moved beyond the desktop and wired environment and into the mobile world. Our mobile devices are true computing platforms with their own operating systems and resources; yet we don’t often think about the computer we are carrying in our pocket. How safe are the applications we use? How secureRead… Read more »

Social Media Speak: How to Avoid an Instagram Faux Pas

By Emily Grenen Increasingly, Instagram is becoming a popular platform to connect and engage with new audiences. Unlike other domains – article commentary, obligatory birthday wall posts, and lengthy status updates are (almost) done away with. With Instagram, you’re focused on photos that anyone with the app can create, right from their smartphone. The platformRead… Read more »