Security51-290x195

Tips for Avoiding Phishing Email Traps

During this time of year people make more online transactions than usual, so it's essential to be extra careful when sending financial and/or personal information

More >
Misc23-290x195.jpg

Five Reasons Your Best Applicants Move On

If you want to hire the best and the brightest candidates, you need make sure you're successfully bringing them to the end of the application process.

More >
mobile48-290x195

The Eighteen Best Android Apps of 2014

With the end of the year fast approaching, the staff at Google Play has made their picks for the best Android apps of 2014.

More >
email4-290x195

Debunking Five Common Email Myths

Everyone wants to work smarter and get out of the office faster; check out when the best time of day is to send an email, whether to use "cc," or what subject line length will get you the fastest reply.

More >
email2-290x195

Nine Email Scandals that Underscore the Need for Proper Archiving

Being able to easily access archived documents, emails and messages takes the guesswork out of certain situations and will ultimately protect your company if used correctly.

More >
Bluebox2015MobileSecurity290

Mobile Security 2015: The Enterprise at Risk

While hackers have many points of entry – point-of-sale devices, phishing emails, malware, etc. - the long reach of mobile to mission-critical apps and data has exponentially increased the potential for a breach.

More >
IT Downloads

Security44 Assessing Security and Privacy Controls in Federal Information Systems and Organizations

This publication provides a set of procedures for conducting assessments of security controls and privacy controls employed within federal information systems and organizations.

Learn more >

Security10 Job Description: Cybersecurity Program Manager

The cybersecurity program manager will support the execution of product cybersecurity elements across global programs and services.

Learn more >

Mobile41 Challenges and Benefits of a Methodology for Scoring Web Content Accessibility Guidelines (WCAG) 2.0 Conformance

This paper explores a methodology to score adherence of a web page to WCAG 2.0 conformance requirements.

Learn more >

Time4 The Time Bandit Solution: Recovering Stolen Time You Never Knew You Had

This excerpt from chapters 1:00 and 1:30 focuses on the causes and manifestations of time lost as a result of unwanted, unnecessary and wasteful interruptions, and provides a calculator to measure how much of your time is wasted by interruption time-loss factors.

Learn more >

IT_Man31 Microsoft SharePoint 2013 Cheat Sheet

This SharePoint 2013 Cheat Sheet covers program fundamentals, as well as tips on managing documents, accessing wikis and blogs, and task management.

Learn more >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date