• Nov 10
    2015
    Traditional education came of age during industrialization, which is why you and I most likely spent our childhoods in classrooms devoted to regimentation and efficiency and governed by the clock. We were vessels to be filled with learning that was delivered by the teacher. Any behavior besides listening, watching, note taking, and responding when called on was regarded as an impediment to this process. Traditionally, teachers were disciplinarians as well ...
  • Nov 03
    2015
    There is a story about the famous bank robber Willie Sutton. A reporter once asked him why he robbed banks, and he replied "Because that's where the money is." The story is apocryphal, and Sutton later claimed never to have said it. "Why did I rob banks? Because I enjoyed it. I loved it. I was more alive when I was inside a bank, robbing it, than at any other ...
  • Oct 27
    2015
    Last year, I gave you some tips on cybersecurity, and one of the things I discussed was choosing passwords: "Use strong passwords, a different one for every site. If the system permits, use at least eight characters and compose them with upper and lower case, numerals, and special characters (like #, &, @)." It’s the same tip you’re likely to get from anyone who discusses passwords, and it’s often built ...
  • Oct 20
    2015
    PRINCE2® (an acronym for PRojects IN a Controlled Environment, version 2) is a structured project management method based on experience drawn from thousands of projects and from the contributions of countless project sponsors, project managers, project teams, academics, trainers, and consultants. PRINCE2® is the most sought-after qualification by companies and individuals working with project teams worldwide. The method originated in the United Kingdom as a discipline for government work, but ...
  • Oct 13
    2015
    October is National Cyber Security Awareness Month (NCSAM), and this week's theme is "Connected Communities: Staying Protected While Always Connected." These days, many of us live a major portion of our lives online. We shop online, bank online, play games online, work online. We are in almost constant contact with friends and family through email, texts, and social media like Facebook and Pinterest. It’s important to remember, however, that as ...
  • Oct 06
    2015
    For the 12th year, October is National Cyber Security Awareness Month (NCSAM). NCSAM was created by the National Cyber Security Alliance and the U.S. Department of Homeland Security as a collaborative effort between government and industry to ensure that everyone has the resources needed to stay safer and more secure online. The urgency increases every year. Each week of NCSAM has a theme, and this week’s theme is “Creating a ...
  • Sep 29
    2015
    I have posted before about how cybercrime has changed. In the old days, the criminals worked somewhat feverishly to breach your network and then make off with, in a manner of speaking, as much data as they could carry. But these days, they are patient. Through phishing expeditions and social engineering, they plant bits of malware in your network and ultimately this malware makes an opening they can exploit more ...
  • Sep 22
    2015
    Logical Operations has become a Champion of National Cyber Security Awareness Month (NCSAM) 2015, and I have been poking around the website of the National Cyber Security Alliance as well as those of our fellow Champions. I am astonished at the amount and quality of free resources available to businesses that want to protect themselves from cyber crime. The Alliance, for example, sponsors a site called StaySafeOnline.org with resources for ...