As more details emerge from the horrible mass shooting in Parkland, Florida on February 14, 2018, one item of interest is a YouTube comment left on a channel created by a man named Ben Bennight of Mississippi. Mr. Bennight noticed a disturbing comment left by someone with the YouTube account name of “Nikolas Cruz”
I received a significant amount of feedback from my recent post on how to setup parental controls with iOS 10 (available here), so I decided to follow on with another post on how to setup parental controls with Windows 10. While Microsoft has had some good parental control features with Windows 7, when Windows
I have discussed here and here many of the dangers that kids face when trying to navigate technology and the Internet and some ideas for parents on how to mitigate these risks. Parents have several choices available to them for parental controls on iOS devices and for this post, I tried several of the
If I were to ask you to install an exterior door in your child’s bedroom and told you that this door could not have any locks, alarms, or other security, how would you react? Most people would be uncomfortable with an unlocked door anywhere in their house and especially in their child’s room. How
Bring Your Own Device (BYOD) refers to allowing end users the ability to use their own personal mobile devices (e.g., phones, tablets, laptops, etc.) to conduct business instead of having a corporate device issued to them. BYOD is often seen as a cost savings and a step toward a “21st Century Workforce” by executives.
A key component to any successful and mature Information Technology (IT) team is a disciplined change control process. Few things are more frustrating to an IT manager than having a service affecting outage and not being able to immediately identify recent changes to the environment.
Change control requires rigor, discipline, auditing, and a commitment from
A classified spillage (commonly referred to as a spill) incident occurs when information is transmitted, processed, or stored on an information system that is not accredited to contain that level of information. Usually, this occurs when a classified document (confidential, secret, top secret, etc.) is created, stored, or emailed on unclassified systems or networks.