• Jan 05
    2016
    According to the 2015 Data Breach Investigations Report from Verizon, the top threats are now (in order of importance): credentials RAM scraping phishing spyware/keyloggers. Compromising credentials is still the greatest threat, but it has been shrinking in recent years and now constitutes no more than half of attacks. Spyware/keyloggers has shrunk most dramatically in the recent past and is now down to about 5% of attacks. But both RAM scraping ...
  • Dec 29
    2015
    The major hacks of the recent past - Sony, OPM, Anthem, Target, Ashley Madison - occurred without warning in unexpected places, making it seem like there is little you can do to personally protect yourself or your business from them. But that’s just what the criminals want you to believe. There’s a great deal you can do to protect yourself and your business. You can practice safe computing, and you ...
  • Dec 22
    2015
    It takes seven to ten years to grow an IT specialist, from novice to adept. This complicates career planning for IT professionals. Many of them try to smooth out the process by using the U.S. Bureau of Labor Statistics Occupational Outlook Handbook. You can go there, and if you can reconcile real-world job titles with those used by the Bureau, you can get a report of last year’s median salary ...
  • Dec 15
    2015
    It's the time of year for predictions, and most major publications have weighed in with theirs. I have looked over many of these published predictions and tried to assess their effect on IT training. I think there are four trends you need to keep in mind going into next year. Don't let them take you by surprise. In 2016… 1. Application development and project management will dominate in IT hiring. ...
  • Dec 08
    2015
    In Sex Tape, the 2014 comedy with Jason Segel and Cameron Diaz, a married couple try to restore the spark in their relationship by making a video of themselves having sex. But the video is automatically synced with all their iPads, including some they have given away. To prevent the distribution of their sex video over the Internet, the couple must retrieve all the iPads. They can’t understand how this ...
  • Dec 01
    2015
    You may remember the Sony hack, which took place a year ago last month. An organization calling itself GOP (for "Guardians of Peace") breached the company's network and threatened to publish its most intimate internal files unless it cancelled the release of a movie called The Interview. The FBI attributed the hack to North Korea, and the movie briefly became a cause célèbre, so that although Sony cancelled its theater ...
  • Nov 24
    2015
    As people in the U.S. are sitting down to say thanks on November 26th, we would like to take this opportunity to thank the hundreds of thousands of people that have allowed Logical Operations into their lives with the goal of providing students with a transformative learning experience that drives them forward to success. As students, professionals, and trainers ourselves, we are fascinated by the way adult education has evolved ...
  • Nov 17
    2015
    The Cobra Effect is an example of unintended consequences. Supposedly, the British colonial government in India was concerned about the presence of venomous cobras in Delhi, so they offered a bounty for dead cobras. Enterprising locals began breeding cobras for the bounty, and when the government found out what was going on, they ended the program. The cobra breeders then released their now worthless cobras, thus greatly increasing the cobra ...