Latest Article

Social Media and Malware—Nothing to Like!

By Kacy Zurkus

With so many users, so few controls, and a tendency for these sites to be used to willingly publicize personal information, social media sites can be a hacker’s playground. The opportunities for social engineering via social media are innumerable—and this social engineering potential is the perfect way to spread malware.


One-on-One Meetings in IT Can Strengthen Your Department

By Ant Pruitt

IT leaders are no strangers to meetings. Meetings with the department, meetings with stakeholders, meetings with vendors, meetings with end users—the list goes on and on. Despite the already busy schedule, it’s well worth your time to also hold regular one-on-one meetings with individual members of your IT department.