• Jun 06
    2017
    The other day, I did a web search on the string “wannacry wake up call” and got “about 1,180,000 results.” The conventional wisdom, then, is that the Wannacry attack is a danger signal to which we need to pay attention. This is a case in which the conventional wisdom is right on target. Let me offer a quick review of the disaster, based on its entry at Wikipedia. The attack ...
  • May 30
    2017
    When I was a child in school, the learning process was all about eliminating distractions. Today, we are more likely to use “distraction” to make learning easier or stickier. If you were to take a course using our Logical CHOICE platform, for example, you would probably find a dozen different ways to approach your learning goals. You would find textual and graphical resources, video libraries, easy access to your classmates, ...
  • May 19
    2017
    Pundits and commentators are concerned that automation is eliminating jobs, and some say it is happening at an unprecedented rate. An article in the New York Times last December captured the widespread worry. Its title: “The Long-Term Jobs Killer Is Not China. It’s Automation.” You only have to look around to see what kinds of jobs are being lost to automation. Taxi drivers are being replaced by ride sharing services. ...
  • May 09
    2017
    The 2017 Data Breach Investigations Report is out. Verizon Enterprise Solutions performs a service to the community by publishing this report every year. It is one of the most comprehensive reports of its type that I have ever seen. This year’s compilation covered 42,068 incidents and 1,935 breaches. I advise you to visit http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/ and download the entire report, but I wanted to pull out one or two highlights that ...
  • May 03
    2017
    Last month Logical Operations joined the IT Certification Council, an organization focused on growing and promoting professional certifications in IT. It establishes industry best practices, markets the value of certification, enhances exam security, and works on other issues connected to certification. At Logical Operations, we believe in professional certifications, and we’re glad to have the chance to work with industry leaders on the issue. I think the value of certification ...
  • Apr 25
    2017
    Here are five urgent questions for organizations concerned about cyber security right now: Can your solution provider help you navigate the perilous road to compliance? What’s your strategic incident response plan to a data breach? What emerging risks threaten IoT and big data? What countermeasures and new technologies can protect against those risks? How can you keep insider threats outside? As it happens, those topics (and others) will be the ...
  • Apr 19
    2017
    A recent opinion piece in Computerworld by Ira Winkler asks, “What prevents breaches: process, technology or people? One answer is PC, and one is right.” Most people — and most security experts — when asked the most important element in cyber security will say “people.” Winkler says it’s not people, it’s process: “Before you can focus on the people in a security program, you must be able to define exactly ...
  • Apr 04
    2017
    There are millions of mobile apps available now through the Apple App Store, Google Play, and Windows Phone Store. But the major commercial app outlets are only part of the story. Increasingly, organizations are harnessing employee connectivity by creating their own proprietary mobile apps. Organizations find that developing a mobile app is a lot like developing a traditional desktop app, in that best practices include start with security in mind, ...