• May 19
    2017
    Pundits and commentators are concerned that automation is eliminating jobs, and some say it is happening at an unprecedented rate. An article in the New York Times last December captured the widespread worry. Its title: “The Long-Term Jobs Killer Is Not China. It’s Automation.” You only have to look around to see what kinds of jobs are being lost to automation. Taxi drivers are being replaced by ride sharing services. ...
  • May 09
    2017
    The 2017 Data Breach Investigations Report is out. Verizon Enterprise Solutions performs a service to the community by publishing this report every year. It is one of the most comprehensive reports of its type that I have ever seen. This year’s compilation covered 42,068 incidents and 1,935 breaches. I advise you to visit http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/ and download the entire report, but I wanted to pull out one or two highlights that ...
  • May 03
    2017
    Last month Logical Operations joined the IT Certification Council, an organization focused on growing and promoting professional certifications in IT. It establishes industry best practices, markets the value of certification, enhances exam security, and works on other issues connected to certification. At Logical Operations, we believe in professional certifications, and we’re glad to have the chance to work with industry leaders on the issue. I think the value of certification ...
  • Apr 25
    2017
    Here are five urgent questions for organizations concerned about cyber security right now: Can your solution provider help you navigate the perilous road to compliance? What’s your strategic incident response plan to a data breach? What emerging risks threaten IoT and big data? What countermeasures and new technologies can protect against those risks? How can you keep insider threats outside? As it happens, those topics (and others) will be the ...
  • Apr 19
    2017
    A recent opinion piece in Computerworld by Ira Winkler asks, “What prevents breaches: process, technology or people? One answer is PC, and one is right.” Most people — and most security experts — when asked the most important element in cyber security will say “people.” Winkler says it’s not people, it’s process: “Before you can focus on the people in a security program, you must be able to define exactly ...
  • Apr 14
    2017
    In March, the U.S. Senate voted to roll back broadband provider privacy regulations promulgated by the FCC. This means ISPs will not be prohibited from selling customers' web-browsing histories and other data without their permission. In terms of your life on the web, there are three things you should understand about this development: It’s largely symbolic; the privacy regulations had not yet gone into effect, so the rollback is unlikely ...
  • Apr 04
    2017
    There are millions of mobile apps available now through the Apple App Store, Google Play, and Windows Phone Store. But the major commercial app outlets are only part of the story. Increasingly, organizations are harnessing employee connectivity by creating their own proprietary mobile apps. Organizations find that developing a mobile app is a lot like developing a traditional desktop app, in that best practices include start with security in mind, ...
  • Mar 28
    2017
    I recently did a Google search on the phrase “free retirement planning guide,” and got 10.5 million hits. Some of these hits were from organizations like Consumer Reports and AARP. Most of them were from firms that sell retirement planning services. I don’t see anything sinister in this. In fact, I think it indicates an extremely effective marketing technique, particularly for complex product and service offerings. It is called digital ...