Blog
Beating Back Web-based Attacks
By Bill Kenealy
While the specifics of how most cyber attacks on companies are committed may not interest some, security professionals do not have that luxury.
This blog entry was originally posted March 29, 2016 by Bill Kenealy
Apple's Spat With Feds Clarifies Importance of Understanding Encryption
By Bill Kenealy
Apple's protracted, public fight with the FBI and the Justice Department over a court order to unlock an iPhone 5C is notable for the amount of attention it has focused on the somewhat arcane issue of encryption.
This blog entry was originally posted March 17, 2016 by Bill Kenealy
Why Microsoft Word Training is a Wise Decision
By Bill Kenealy
Given the wide array of new and complex technologies in the modern workplace, dedicated training for Microsoft Word might seem at first blush somewhat superfluous.
This blog entry was originally posted March 03, 2016 by Bill Kenealy
Why Sleep When You Can Drink Coffee? (Part 3)
By Craig Jensen
My two previous blogs discussed both coffee/caffeine and sleep, to an extent, and the way they operate individually
This blog entry was originally posted January 27, 2016 by Craig Jensen