Over the past few years, we have seen an ever-changing landscape when it comes to technology. When I first started in IT, my company decided on IBM for everything. Servers,…
Back in October, I wrote about Shadow IT and how some users are turning to popular file sharing applications like Dropbox, OneDrive, and Google Drive to get their work done…
I don’t know how many times in the past 15 years I have heard people say, “My computers running slow! I need an upgrade.” Everyone, even your colleagues in the…
(This is the second part of a series. You can find Part One here.) It behooves me to remind you that there are many spoilers beyond this point. If you…
Welcome to the final post in my series on DevOps. If you’ve been following along, you know the content generated several questions. In this post, I will consolidate those questions…
In this last post of my 5 More Ways I Can Steal Your Data series, I focus on my belief that all data security comes down to empathy. Yes, that…
When I first considered writing this post about possible HIPAA violations, I could clearly imagine how non-IT compliant file sharing could cause issues with HIPAA compliance. It wasn’t until I…
You’ve probably heard about the importance of business continuity and disaster recovery. Today, more businesses have business continuity plans than ever before. With so many businesses looking to secure their…
Over the next few weeks, I will be releasing a series of articles covering the value of data analytics and insight, focusing on five of the key business drivers that…
In my recent post 5 More Ways I Can Steal Your Data – Work for You & Stop Working for You I started telling the story of a security guard…