quirky is the new cool

Quirky is the New Cool.

  Remember that girl in school who dressed a bit “weird”? She was goth long before goth became a trend. Or that guy in the office who never seemed to fit in? He may have been labeled “odd”.   I remember when someone who was covered in tattoos made heads turn, unacceptable? I know someone in law school who tattooed her …

Quirky is the New Cool. Read More »

IoT Security Risks: 4 Types of Cyber Attacks to be Aware Of

The Internet of Things (IoT) has exploded, with more embedded devices being adding every month. From fitness bands and smart appliances to remote patient monitoring devices and industrial equipment, the technology has not just captured the fascination of consumers and businesses, but hackers as well. IoT presents a new set of security risks that both …

IoT Security Risks: 4 Types of Cyber Attacks to be Aware Of Read More »

IoT Security Risks: 4 Steps to Create a Cyber Risk Management Plan

  Welcome back to the second installment in our series on IoT security risks. In part 1, we discussed the security vulnerabilities associated with embedded devices that are connected to the Internet of Things (IoT). Today, we will explore the cyber risks that your organization may face and address some proactive steps that you can …

IoT Security Risks: 4 Steps to Create a Cyber Risk Management Plan Read More »

group brainstorming

7 Tips for Successful Brainstorming Sessions

Two heads are better than one, right? So, it just makes sense that when you need to create fresh ideas and solutions, you gather your team and for a brainstorming session. In theory, group brainstorming should open up the flood gates on ideas. But sometimes it can be a barrier. Prevent a pressure cooker. Picture …

7 Tips for Successful Brainstorming Sessions Read More »

How to Fix 5 Common Human Errors that Lead to Security Threats

Human error is involved in 95% of security breaches. A seemingly simple mistake can lead to a major disaster. The 2015 Cost of Data Breach Study reported that human error was responsible for 25% of the data breaches that occurred in the US, resulting in an average mitigation cost of $198 per capita, and an …

How to Fix 5 Common Human Errors that Lead to Security Threats Read More »

cloud computing

How Secure is the Cloud for Enterprise Computing?

Businesses are facing a challenge with their enterprise computing. Should they go to the cloud or keep their data on a “secure” in-house server? Every time a major data breach is reported (e.g., Target in 2013, Home Depot in 2014), decision-makers challenge the cloud’s security. In reality, those data breaches were caused by human error, …

How Secure is the Cloud for Enterprise Computing? Read More »

meeting tips

3 Tips to Make Your Meetings ‘Lean’ and Reduce Miscommunication

The principles that drive lean manufacturing are focused on reducing unnecessary actions and increasing quality and customer satisfaction. Some businesses focus their “lean and mean” strategy on processes. They can even apply to how you run your meetings. We’ve discovered the hidden waste of miscommunication in manufacturing is a critical gap to address.    Here …

3 Tips to Make Your Meetings ‘Lean’ and Reduce Miscommunication Read More »

Chat