-
By Natalie Hope McDonald
| November 23, 2015
With people expected to spend upwards of $3 billion in online shopping for the first time ever this year, 2015’s Cyber Monday could become the biggest shopping day in online history. E-commerce has come a long way from the Wild West it had been in terms of security, but how did it get there and where is it headed?
Full Story
-
By James Stanger
| November 19, 2015
Security professionals are great at borrowing terms from other industries. One they haven’t hit on, which could be the most useful, productive act of linguistic theft yet, comes from American football, by way of oncology.
Full Story
-
By Matthew Stern
| November 18, 2015
When it comes to connected devices used within the home or office, what was science fiction a decade ago is now here. Learn about the Internet of Things; its potential, the challenges to adoption it faces and what it may mean for your career.
Full Story
-
By Matthew Stern
| November 11, 2015
Industry trends have driven more and more healthcare-related data online and hackers have realized that protected health information (PHI) can be more valuable than credit card information for purposes ranging from identity theft to blackmail. The sheer amount of data taken is staggering. But CompTIA’s Healthcare IT Technician (HIT) certification is the cure.
Full Story
-
By Matthew Stern
| November 10, 2015
For Andrew Donga, network engineer at NGS, IT is a perfect career match. And he stumbled upon it by accident while serving in the U.S. Navy from 2008 to 2012. When he left the service, he found that while he had learned a lot, he had only scratched the surface of networked communications. That’s where CompTIA certifications and New Horizons came in.
Full Story
-
By Matthew Stern
| November 06, 2015
It has been two years since Darcy Pelosse took his first dive into the IT channel, and in that relatively short period of time he has learned a tremendous amount. But one of the most important lessons he has learned is that understanding how computers and networks work is not just for network administrators, programmers and others on the applied side of the IT field. In IT sales, to truly understand what a client needs, you have to know the basics of how the technology functions.
Full Story
-
By Natalie Hope McDonald
| October 29, 2015
IT security attacks directed at local governments are increasing. With millions of personal records at stake, not to mention the nation’s overall security at risk, the cost of these attacks can become astronomical. Not only do many lose money when hackers steal personal information, the loss of citizen trust may be among the most challenging to recover.
Full Story
-
By James Stanger
| October 26, 2015
Behind all of the information and acronyms we use every day, we are all looking for a compelling, clear narrative. The common theme that ties together this alphabet soup is certification. It helps set the narrative in motion.
Full Story
-
By Natalie Hope McDonald
| October 20, 2015
An IT pro highly skilled in security will likely enjoy a thriving career these days. But such techs need to be able to do a lot, including set up a successful security program, implement it company-wide, manage it on a continual basis, audit it and try to penetrate it, and respond to attacks and any other issues immediately.
Full Story
-
By Matthew Stern
| October 13, 2015
While there has been no out-and-out declaration of cyber-war by one state against another, there has nevertheless been a proliferation of hacking cases targeting both state and corporate enterprises suspected to have been executed by nation-state actors. The CompTIA Advanced Security Practitioner certification can provide a first line of defense.
Full Story