Monday, March 11, 2013

How to avoid becoming a victim of SMiShing (SMS phishing)

  IT Resume Makeover: How to Create an Effective Executive Resume | How the 2013 Computerworld Premier 100 IT Leaders were chosen
 
  Network World IT Best Practices

Forward this to a Friend >>>


How to avoid becoming a victim of SMiShing (SMS phishing)
Get ready for SMiShing, or phishing attacks that come to your mobile phone. These types of attacks are on the rise, and with so many people using their smartphones to access corporate networks and data, it's a new danger in the world of BYOD. Follow these tips to avoid becoming a victim. Read More


RESOURCE COMPLIMENTS OF: BICSI

A Credential for the ITS Professional
Today's data center designer must have knowledge of mechanical, electrical and telecommunications systems and their interaction – areas not typically found in the same reference manual or standard. But, with the BICSI 002, users get a comprehensive look at what should be considered when working with critical systems. Guidelines for a better tomorrow, today: ANSI/BICSI 002-2011, Data Center Design and Implementation Best Practices. Click for free methodology.

WHITE PAPER: CA Technologies

Data Protection Made Simple
Increasing demands placed on IT, along with tightening budgets has prompted IT leaders to seek out alternative technologies and improved methods of providing backup, archiving and disaster recovery to meet the demands of the 24/7 business. Learn how CA ARCserve provides a single solution that cuts through the maze of data protection complexity. Learn More

INSIDER
IT Resume Makeover: How to Create an Effective Executive Resume
In CIO.com's most recent edition of the IT Resume Makeover Series, certified career coach and resume writer Cheryl Simpson demonstrates the elements necessary to get qualified IT pros into C-level interviews. Read More

How the 2013 Computerworld Premier 100 IT Leaders were chosen
Each year, Computerworld accepts nominations from across the industry -- from vendors, IT users, public relations and marketing professionals, Computerworld readers and past Premier 100 honorees. Eligible nominees include CIOs, chief technology officers, senior vice presidents, vice presidents, IT directors and managers from a cross-section of user and vendor companies and their IT divisions, including but not limited to professionals in network management, database management, Web management, help desk operations, application development, project management, contract management or procurement. Read More


WHITE PAPER: Riverbed

Top Ten Reasons to Use Steelhead Cloud Accelerator
Steelhead Cloud Accelerator is a unique technology integration that can offer performance improvement for SaaS applications consumed by enterprises. It combines the best of WAN optimization with the best of Internet optimization to provide a seamless transition for users between private and public clouds. Learn more. Learn more.

Securing the network beyond passwords
Passwords have been a weakness of network security since the development of computer networks. Through guessing weak passwords, exploiting weak passwords, acquiring passwords through social engineering, or more recently using malicious software like Advanced Persistent Threats (APT), attackers have focused on compromising passwords to gain access to the network. Read More

Premier 100 IT Leader: Malcolm Jackson
Malcolm Jackson, CIO of the U.S. Environmental Protection Agency, is a drilling engineer by training, and he's tech-savvy -- he worked as a mainframe programmer when he started his career in the 1980s. But he also has a background in marketing, which is especially helpful at the EPA. Read More


WHITE PAPER: AccelOps

EMA Advanced Performance Analytics report
Advanced Performance Analytics (APA), as Enterprise Management Associates (EMA) defines it, brings real-time or near real-time "big data" to IT operations, architects, service managers and even applications development, as well as IT executives and non-IT business stakeholders. Read Now

SSH key mismanagement and how to solve it
In 1995, when I was a university student in Helsinki, I developed a security protocol to protect data-in-transit as it moved throughout our network. I named it the "secure shell," or SSH for short. Today, SSH is used by organizations of all types and sizes as a secure method to move data from machine to machine and provide remote administrator access. From the perspective of an attacker or malicious insider, SSH is an artery that carries vital organizational data. Read More

Federal CIOs Need Authority to Improve IT Efficiency
The soon-to-be-introduced Federal Information Technology Acquisition Reform Act would grant agency CIOs control over federal IT budgets, encourage cloud computing and seek to reduce waste and under-performing technology programs. Read More

The Best BlackBerry 10 Apps
Looking for the best BlackBerry 10 apps that will be available on launch day in the United States Look no further. CIO.com's Al Sacco spotlights 20 of the best early BlackBerry 10 apps, including apps for social networking, image and video editing, cloud storage, audio, sports and more. Read More

 
 
 

SLIDESHOWS

How different tech degrees measure up

Here's our list of lucrative tech degrees, ranked from lowest to highest starting salary.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Researchers discover cold temps can unlock secured Android phones

2. FTC dumps on scammers who blasted millions of text messages

3. Microsoft Patch Tuesday targets Internet Explorer drive-by attacks

9. 6 of the very coolest new Microsoft lab projects

5. Bizarre 5-pound Android tablet morphs into Win8 all-in-one

6. iPad 5 rumor rollup for the week ending March 6

7. Killer open source admin tools

8. CEO of Cisco competitor talking FUD

10. The best (and worst) countries for cloud computing

4. Mellanox looks to head off Cisco, Juniper with open source Ethernet plan

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

2 comments:

  1. Anonymous12:07 AM

    I love your blog.. very nice colors & theme. Did you create this website yourself or did you
    hire someone to do it for you? Plz respond as I'm looking to construct my own blog and would like to know where u got this from. cheers

    Have a look at my webpage - diets that work fast

    ReplyDelete
  2. Anonymous12:04 AM

    Wow, this article is good, my youngеr sister is analyzing suсh things, thus I аm gοіng tο inform her.


    my web blog ... legal ecstasy

    ReplyDelete