Data security vs. network security: What should your business prioritize?

Many businesses that have allowed employees to continue working from home for the foreseeable future are aware that they need to update their cybersecurity. It’s likely that they have allocated some budget and IT resources to make those necessary changes. However, IT budgets are finite. Given the economic disruption of the pandemic, enterprises must strategically …

Are you sick of Shadow IT?

“Shadow IT” means the creation of IT systems without specific approval of the IT team. In the good old days, this was mostly limited to users creating Microsoft Access databases and complex Excel spreadsheets. IT teams used to feel the same way about Microsoft Excel and Access as they did about viruses. They appeared innocuous at …

The Pain of Change is Mandatory – it is the suffering that is optional

Now that I have grey in my beard (actually I have lot of grey in my beard) I often get asked how do I grow my career in IT and how should I approach my career development – the question often comes with the anticipation of receiving a secret magic key and a clear path …

How to Stop Distributed Denial of Service (DDOS): Why not try BCP38?

Today, as I watched CNN, I was saddened to see that a Denial of Service (DOS) or a Distributed Denial of Service (DDOS) attack has brought down Internet services for more than 40 Millions users in the East Coast of the United States. DOS attacks are those launched across the Internet to take websites and other services off the …