• Feb 03
    2015
    Most successful companies of today, whether enterprises, mid-market, or small small businesses, are either based online or have a firm presence online. And the reality is, just by conducting business online, any one of these companies can suffer a breach in data security. Fortunately, there are some universal rules about securing data that all companies online today can learn and benefit from. Since Digital Guardian strives to provide data security ...
  • Jan 16
    2015
    Imagine your boss gives you a directive that sounds really absurd. You’re afraid that following orders could cause a customer to leave, hurt the company’s reputation, or even break the law. You may not like it, but it’s part of your job to protect your boss from self-inflicted harm. There is a right way and a wrong way to do it, though. Here are six guidelines: 1. DO SOME RESEARCH ...
  • Jan 02
    2015
    One of the most important legs of any certification journey involves the long process of preparation and learning that takes place over the weeks and often months prior to scheduling an exam. Even seasoned IT pros often have quite a bit of new material to take in when contemplating a new certification. The field of study and training providers is crowded. It’s difficult to carve out a niche, and difficult ...
  • Dec 16
    2014
    What you teach employees during mentoring, coaching or skills training will be out of mind as soon as you’re out of sight unless you reinforce the learning. For that you can thank the “forgetting curve.” This psychological principle, first identified in the 19th century, posits that much of what we learn is quickly forgotten, most of it within hours. Here are five tactics you can use to help employees remember. ...
  • Dec 09
    2014
    Don't Make Virtual Meetings a Bore You have to hold a meeting, but everyone who should participate is somewhere else. What should you do? Hold the meeting virtually. More than 20 million virtual meetings are held every year. Some 85 percent of projects now include remote team members and that percentage keeps rising. If you plan it right, a virtual meeting will let you accomplish everything you could with an ...
  • Dec 04
    2014
    As featured in the Democrat and Chronicle: Depending on how you count, Logical Operations is a 2-year-old start-up firm or one of the oldest information technology training firms in the Rochester region. The first incarnation of Logical Operations came when it was founded in 1982 by two Rochester Institute of Technology professors. And it’s gone through numerous hands and incarnations since then — being bought in 1991 by Ziff-Davis Inc., ...
  • Dec 03
    2014
    The majority of successful companies of today are well aware of common data security issues and put a great deal of trust into their own efforts towards preventing a data security breach. However, as demonstrated by recent security breaches of several large, tech-savvy companies such as Target, LivingSocial, Facebook, Gmail, and Twitter, no set of security measures is completely infallible to a breach. What businesses of today have to then ...
  • Nov 24
    2014
    Though most organizations have made rapid strides in securing their networks, many are still vulnerable to problems from the misuse of mobile applications. As more employees are using their own devices for work, the potential for compromising security is increasing. There’s a shortage of developers with mobile app security skills. Organizations need to bring staff up to speed quickly in this vital function. Following is a curriculum for training for ...