Blog

Beating Back Web-based Attacks

By Bill Kenealy

While the specifics of how most cyber attacks on companies are committed may not interest some, security professionals do not have that luxury.

This blog entry was originally posted March 29, 2016 by Bill Kenealy


Apple's Spat With Feds Clarifies Importance of Understanding Encryption

By Bill Kenealy

Apple's protracted, public fight with the FBI and the Justice Department over a court order to unlock an iPhone 5C is notable for the amount of attention it has focused on the somewhat arcane issue of encryption.

This blog entry was originally posted March 17, 2016 by Bill Kenealy


Why Microsoft Word Training is a Wise Decision

By Bill Kenealy

Given the wide array of new and complex technologies in the modern workplace, dedicated training for Microsoft Word might seem at first blush somewhat superfluous.

This blog entry was originally posted March 03, 2016 by Bill Kenealy


Why Sleep When You Can Drink Coffee? (Part 3)

By Craig Jensen

My two previous blogs discussed both coffee/caffeine and sleep, to an extent, and the way they operate individually

This blog entry was originally posted January 27, 2016 by Craig Jensen