SEVEN STEPS TO PROTECT YOUR SMARTPHONE


Our previous blog posts have examined the various cyber-based threats posed to Smartphones.  In this post, we examine seven steps that you can take to help mitigate those risks:   1. Use Two Factor Authentication:   This is also known as “2FA” for short. Two factor Authentication means that you are using two layers of […]

Read More…


LIKE A SHINY NEW TRACTOR


  Driving across the Midwestern states of Nebraska and Iowa this week led me to some interesting conclusions about modern farming. First, farms and crops come in all shapes and sizes. Second, there are farms that are clearly more equipped for the fast-paced lifestyle of modern America. Third, there are efficient ways to farm, and […]

Read More…


BE AWARE OF MALWARE


  Cybersecurity is a growing field in this developing technology era; it is something that any organization has to pay attention to because of the many cyber threats present in today’s society. Read the following blog post written by Chris Brook for Digital Guardian about potential, and very destructive, malware threats.     Being aware of […]

Read More…


THE TOP SECURITY THREATS TO SMARTPHONES – PART 3


In this post, we continue our series on the top threats to Smartphones in 2018, with a brand-new kind of cyber threat:  Ransomware.   In this cyber-attack, cyber attackers want to hold your Smartphone hostage until you literally pay a ransom payment. This kind of attack is known as Ransomware which is described as a […]

Read More…


4 Reasons Why Online Education is an Effective Tool for Instructors


Many institutions have introduced online learning tools into course content.  According to Online Learning Consortium, about 28 percent of higher education students were enrolled in at least one online course in 2016. With more and more students entering institutions of higher education, online coursework has become an effective tool for instructors as they struggle with […]

Read More…


Minding the IT Skills Gap


The curvature at the edge of a London Underground platform, and the shape of the underground trains, leave a significant gap that could prove dangerous for passengers. For years, drivers and station attendants had the job of making sure passengers watched out for that space, or gap.   In 1968, London Underground saw the need […]

Read More…


The Top 5 IT Certifications of 2018


A couple of weeks ago, we posted a blog that examined the benefits of making New Year’s Resolutions to further advance your career with IT Certifications. If you have taken our advice, the next step is deciding which specific certifications to get.  This can be a daunting task, as there are so many to choose […]

Read More…


What is Virtualization?


We all have heard about the Cloud, for the most part. It’s this neat little place where you can store data and get software applications for a fraction of what it would normally cost at the retail level.  But there are other terms that get used with the Cloud that cause confusion.  One of these […]

Read More…


The Top 5 Benefits of IT Certification In 2018


As we approach the New Year of 2018, we will be making resolutions that we promise ourselves to keep. The resolution that is probably at the top of everyone’s list is weight loss, or something like it.  While this is undoubtedly important, why not make career advancement with an IT Certification an even higher priority? […]

Read More…