October. It’s the heart of football season and a time when pumpkin spice surfaces as the premier ingredient in the cooking world. But October is also a time for something more serious; something that each of us should place on a pedestal above such a highly touted culinary craving: cybersecurity. Supported by the Department of […]
There are few jobs as cool and as necessary as those within the cybersecurity realm. Professionals in this field are working on the cutting-edge of technology, using highly-refined computer based training to keep cybercriminals at bay. Working in cybersecurity is consistently challenging as hackers are constantly updating and changing their techniques in order to gain access […]
Servers and other electronic, magnetic, and wireless equipment emit and are affected by electromagnetic radiation. This gives rise to three potentially serious problems: snooping, interference, and electromagnetic pulse (EMP) susceptibility. Fortunately, all three problems can be easily mitigated with a faraday cage. The idea is that surrounding your equipment on all sides with a grounded […]
EC-Council is a leading international certification body in information security. The EC-Council Global Awards launched in 2007 to recognize a distinguished group of accredited training centers and certified instructors who have succeeded in providing the best overall experience to EC-Council’s global customers and certified members. At the 2015 EC-Council Global Awards, our team received two […]
Let’s Talk! Hi, guys. I’m Peter. You may recognize me from the numerous ads, emails and newsletters featuring my face over the past six years. I am the spokesman for New Horizons Computer Learning Centers’ flagship annual event, SpecTECHular. Each year, I compile business data on the latest trends and topics in IT and Business […]
Pete Cortez, Technical Instructor with New Horizons Computer Learning Centers of San Antonio, was recently recognized by EC-Council, a leading international certification body in information security, as one of the top three instructors in North America with the Circle of Excellence award. 2014 marks the eighth time Pete has been recognized by EC-Council for outstanding performance.
Businesses have had to cope with an increasing number of cyberattacks in recent months, bringing cybersecurity and data loss prevention solutions into the spotlight. In a blog post written last week, Microsoft partner and CGI vice president of global cybersecurity John Proctor expressed the need for companies to employ identity and access management techniques. IAM allows for […]
Whether you think of Edward Snowden as a hero or a traitor, one thing’s clear: It’s critical to protect your own organization’s data, so you may want to learn what the NSA did wrong that allowed Snowden to gather and disseminate top secret information.
Holding down an IT career may now mean much different things than it has in past years. For example, CIO.com’s Tom Kaneshige reported on a recent survey by TEKsystems, which found that 35 percent of IT leaders and 25 percent of general professionals aren’t sure if their company’s bring-your-own-device policy is actually in-step with data […]
For security, you may want to limit the number of computers that can be connected to a given portion of the network. If there are too many, this may indicate that there are connections that don’t belong there. Accordingly, the following command limits the number of MAC addresses that can be connected to a given […]