What on earth are you talking about? Every field has its own set of short-cut phrases and acronyms, and IT is no different.
07 May 2015
Social engineering (SE) is the art of manipulating people so they give up confidential information. While the term itself is relatively new, the idea goes back to the beginning of time. Those who use social engineering online today are called phishers or scammers, and in the old days they would have simply been called con men.
I started using OneNote as a way to get the Post-It notes off my desk. It seemed like a simple way to store little pieces of information that didn’t belong anywhere else. In OneNote, I could easily find and track them. Now, I hardly ever use Post-Its (sorry, 3M). The good news is, if you use Microsoft Office, you probably already have OneNote, so it’s easy to give it a try.
Ever wish you could easily figure out why there’s an extra space between paragraphs, change capitalizations without retyping or do a quick calculation in Word? Here are 8 timesaving features in Word to help you do those things and more. Here are 8 timesavers that work in Word 2010 and 2013. Click on each tip to see a screen shot of the suggestion.
What is the IT Security Poverty Line? It’s the place where your business has the minimally acceptable level of security needed to fend off an “opportunistic adversary”, which is basically a hacker who takes advantages of security weaknesses in a network. In 2014, 85% of cyberattacks were opportunistic.
Here are the “Worst Passwords of 2014” as determined by SplashData. They’re the 25 most common passwords found on the Internet – thus making them the “Worst Passwords” that could expose anybody who uses them to being hacked or having their identities stolen.
Get an inside look at the world of IT risk, innovation and change delivered straight to your inbox each month.