York Thought Leadership Blog

Danielle Toste

Recent Posts

5 IT Skills That Will Get You Hired This Year

Posted by Danielle Toste on Thu, Sep 28, 2017 @ 15:09 PM

The job market for information technology is steadily and consistently growing. Technology is constantly evolving with new skills developing fast and outdated skills getting pushed out. Because of those variations, here is a list of the top 5 IT skills that will be sure to benefit IT professionals in 2014.

Big Data

Big data is used to describe the exponential growth and availability of data. A recent IDG Enterprise survey of over 750 IT decision makers showed that nearly half will be implementing big data projects or are planning to in 2014. This is a 5% increase over last year; even though it might seem small, it is showing that big data is growing and will continue to grow each year.

Big data is being implemented in all different types of businesses, from sports to retailers, companies are realizing the valuable business intelligence they can gather to improve decision making and gain a competitive advantage. Big data can analyze anything from how often a person visits a location and track their purchases which then can be used to discover
how businesses can personally tailor their next visit. 

Below are specific skills that are needed this year in big data:

  • ETL (Extract, Transfer, and Load) Developers
  • Hadoop Developers
  • Visualization Tool Developers
  • Data Scientists
  • OLAP Developer
  • Data Warehouse Appliance Specialist
  • Predictive Analytics Developer

Mobile

The need for mobile application developers is growing as much as the use of mobile technology is. About 20% of web traffic last year came from a mobile device. Yet, mobile app development is ranked as the third most difficult skill to find according to Computerworld. Most companies want someone who has experience with developing for Apple’s iOS . There are a lot of other skills needed in order to develop mobile apps. Training in Java, jQuery, and other scripting languages are just a few skills associated with mobile app development. The shortage of people with these skills and an increase demand for app developers has caused a shortage in this
area.

Cloud

In 2012, the adoption and acceptance of cloud technology
grew so much that 1.7 million cloud-related jobs went unfilled. Companies are
looking for individuals with knowledge in migrations, integration, and
developer knowledge of different cloud providers’ application programming
interfaces. The future of data storage is going toward cloud meaning that the
demand for IT professionals with these skills is only going to get higher. 

Security

Due to the increase in software hacking and the uncovering
of NSA activity, IT security skills are extremely in demand for 2014. Security
is the top concern of every CIO’s mind, so the need for solid security
architecture is always going to be around. Those who have experience in
security saw a 23% increase in value and demand over 2013 and that number will
continue to rise in 2014 with a quarter of businesses looking at growing their
IT security staff.

Web Development

Web development is still a hot skill for IT professionals
and as long as the internet is around it will be. More companies are especially
interested in those who know open source languages and modern languages such as
Ruby and Python because this de-emphasizes Microsoft language and shows
initiative. Companies see web development as such an investment for their
business and will pay lots of money for them. It is vital that web developers
have framework knowledge, widget development, CMS customization, plugin
development, and flash knowledge because all of these components are what companies
want for their websites. 

 

Having any one of these five skills will make you attractive
to prospective employers and due to the shortage of experienced professionals
in these areas, they could possibly drive up your salary. So, if you are
looking for a possible career change or just want to expand your knowledge,
tech executives everywhere would highly recommend developing and perfecting
these skills.

 

Which would make your top 5 list? Answer below!

We Won’t be Hacked: Top 10 IT Security Myths

Posted by Danielle Toste on Thu, Sep 28, 2017 @ 15:09 PM

Security breaches happen every day. Some are as small as a person disputing a $50 fraudulent charge on a card to huge security breaches, such as the Department of Veterans Affairs, that resulted in 26 million veterans, active-duty, military personnel, and spouses information being
compromised. With IT security being a hot topic and consistent news story in the media, we decided to take a look at some of the top IT myths and how to combat them.

Myth 1: We won’t be hacked

No matter what type of security system businesses have in place, there is always a possibility for a breach. Face the business responsibility to confront security-related requests and make use of a security classification framework. 

Myth 2: We have physical security (or SSL) so you know your data is safe

This myth is associated with not understanding the risk. Ensure that security purchases match data requirements.

Myth 3: Regular
expiration strengthens password systems

Research shows that having regular password expiration may not be useful
and that it should be done randomly. Although, stopping passwords from being
hacked completely might not be possible, this is at least one way to try and
prevent it.

Myth 4: Moving the CISO outside of IT
will automatically ensure good security

Moving the services won’t stop a
company from being hacked. They need to find the area of weakness in their
security programs.

Myth 5: Adhering to security practices is the CISO’s
problem

Passing off the problem to
another business unit won’t solve the issue either. A company should build an
information security program around their culture.

Myth 6: Cyber security is a technical issue
for which executive level business management has little or no ability to
contribute

Even though this statement might not be said,
this is implied thru behaviour. It is management’s responsibility to define a
security policy for the overall organization and that requires management to
accurately understand what is needed in a security plan.

Myth 7: IT is, and should be, responsible for
cyber security

Yes, IT is responsible for enforcing,
preventing, and/or detecting behaviours defined by the company’s security
policy. Yet, IT should not be making decisions about who should or shouldn’t be
able to access information. That comes down to the myth above-- management.

Myth 8: Being compliant makes us secure

Just because a company passes a compliance
audit does not ensure that one is properly secure. It only means that the
requirements for a particular regulation or compliance have been met. A company
could be overspending to meet the requirements and still not be secure.
Businesses should focus on improving their security while still meeting the
standards.  

Myth 9: Any computer virus will produce a visible symptom
on the screen

Many people think that a computer with a virus
will start acting up. Not always the case. A computer can run fine and still
have malware on it. The only way to know 100% is by having the device scanned
regularly.

Myth 10:  We have a firewall
on our network, of course we’re protected!

Just having a properly configured firewall
will not protect anyone against malicious content encapsulated over an SSL
connection.

While being protected from all security
attacks might not be possible, understanding of risk and having a thorough
security policy that is implemented and regularly changed to keep up with new
threats will greatly reduce your chances of being attacked.

 

What IT security myths have you heard?

 

References:

http://www.botzandassociates.com/blog/5-cyber-security-myths/

http://www.infoworld.com/slideshow/33387/the-top-13-security-myths-187168

http://www.networkworld.com/news/2013/061113-gartner-reveals-top-10-it-270738.html

View York Solutions Jobs of the Week!

Posted by Danielle Toste on Thu, Sep 28, 2017 @ 15:09 PM

Don't miss out on your next IT job opportunity!

Position: Solutions Architect

A client is looking for a Solutions Architect for a 6-9 month contract in Hopkins, MN. A background in healthcare insurance is preferred with exposure to claims, health and wellness, and Medicade/Medicare being a benefit. The ideal match will be comfortable interacting with the team and find answers needed to complete the tasks. This person will play a crucial role in multiple functions.

This position was posted on 4/7/2014. Click Here
for more details!

Position: Data
Architect

A client in DePere, WI is looking for a Software Engineer
that will be responsible for researching content management solutions to
information technology, work with businesses to understand requirements and
provide solutions, create new application components, and design and develop
user interactions using C#. Net, HTML, and CSS. Candidate must have at least 5
years of experience with Object Oriented design, HTML, Javascript, CSS, C#,
.Net 4.0, .Net 4.5, and proven mentoring skills.  

This position was posted on 4/7/2014. Click Here
for more details!

Position: SAP Finance
Lead

A client in East Chicago, IL is seeking a SAP Finance Lead
for a permanent position. This person will possess understand the overall SAP
direction and create high level view of end state FICO process. He/she will
work with other IT teams in order to respond to business needs and support SAP
production environment. This person will also configure SAP-ECC  system and create rapid prototypes to
demonstrate how requirements will be satisfied. Candidate must have a degree in
Computer Science, Information Systems, or equivalent experience and preferably
has a master’s degree in Business Administration.

This position was posted on 4/8/2014. Click Here
for more details!

Position: Senior Java
Developer

One of our clients in Minnetonka, MN is looking for a
contract to hire Senior Java Developer for a large healthcare client. This
person will preferably have healthcare experience, Java experience, web
services and Groovy or Grails.

This position was posted on 4/7/2014. Click Here
for more details!

 

Want to know more? View
all of our open IT contract positions by visiting our
Job Seekers page!

IT Industry News for the Week of April 21st, 2014

Posted by Danielle Toste on Tue, Apr 22, 2014 @ 14:04 PM

AT&T Eyeing Chicago to Bring Fiber Network

AT&T is trying to keep up with Google and is considering providing broadband Internet speeds of up to 1 gigabit per second to its U-verse customer in Chicago, Los Angeles, and Miami. Currently, AT&T is providing fiber service to customers in and around the Austin, TX area and want to reach over 100 cities.

Before AT&T can begin to install fiber, they have to meet with local leaders of
each city and reach an agreement.

Read the complete article from Chicago Tribune, “AT&T looks to expand high-speed fiber
network to Chicago, others”

A ‘Green” Chemistry Plant Could Be Coming to Minnesota Soon

Segetis, a technology-enabled green chemistry company that produces versatile chemical building blocks, wants to build a facility in Hoyt Lakes. The company focuses on making chemicals out of corn sugar and using it for manufacturing plastics and cleaning products. 

The $105 million dollar project would bring employment and would take around two years to build. While Segetis is looking to invest $74 million into the project, the rest of the money will have to be financed or thru grant programs. 

Read the complete article from Minneapolis/St. Paul Business Journal, “Segetis plans $105M ‘green’ chemistry plant in Minnesota.”

Could Apple and Nike Team Up?

Just last week, Nike laid off many on the team that was responsible for the FuelBand and
announced it would not continue to update the line. Nike had planned to release a new, thinner FuelBand sometime in the fall, but the company said those plans have been canceled and won’t say when a new one will be out. Yet, with Apple’s CEO, Tim Cook, spotted wearing Nike’s FuelBand at recent sporting events, it has led to a lot of speculation that a potential partnership.

Read the complete article from CNN Tech, “Is an Apple-Nike partnership on the way?”

Topics: IT industry, Industry News, Information Technology

Check Out York Solutions Jobs of the Week!

Posted by Danielle Toste on Thu, Apr 17, 2014 @ 09:04 AM

See the latest IT job opportunites that have opened up!

 

Position: SAP Transportation Lead

A client is looking for a SAP Transportation Lead for a direct hire position in Indiana Harbor, IN. This person must understand the overall SAP direction, create a high level view of end state TM process, do functional mapping, gap analysis, and recommend the best way to address the
gaps. Candidate must have a bachelor’s degree in computer science, information systems, or equivalent experience. He/she will have at least 5 years of SAP Logistics hands on configuration and implementation experience and at least two SAP TM full life cycle implementations.  

This position was posted on 4/15/2014. Click Here for more details!

Position: Linux Admin

A client in St. Paul, MN is looking for a Linux Server Administrator who will be responsible for day-to-day support for Linux Operating Systems, various operational utilities and server hardware, and providing technical support for SAP and associated environments. Candidate must have 1-2 years of technical support, 3-6 years of Linux, 3-6 years of systems support, and a bachelor’s degree in computer science or equivalent.   

This position was posted on 4/15/2014. Click Here for more details!

Position: Windows Server Systems Admin

A client in Maple Grove, MN is seeking a Windows Server Systems Admin for a 6-9 month contract. This person will work with the team to generate a consistent server build for 2012 and help automate the build process. Candidate will upgrade Windows 2003 servers to 2012, upgrade windows 2008 servers to 2012, and document configurations on the systems. Applicant must have at least 5 years of experience in a Microsoft Windows Server environment, at least 2 years of scripting experience, and 1-2 years of Internet Information Services experience.  

This position was posted on 4/16/2014. Click Here for more details!

Position: SAP SNP and PPDS

One of our clients in St. Paul, MN is looking for a contract to hire consultant with SAP SNP and PPDS. This person must have extensive experience with both SNP and PPDS.

This position was posted on 4/16/2014. Click Here for more details!

 

Interested? View all of our open IT contract positions by visiting our Job Seekers page!

Topics: IT Job Search, IT Hiring, York Solutions jobsoftheweek

The Future of Technology: Cool and A Little Bit Scary!

Posted by Danielle Toste on Tue, Apr 15, 2014 @ 11:04 AM

Think back to how much technology has evolved in the last 30 years. The development and main streaming of computers, internet, cell phones, GPS, televisions, DVD players, etc. has shaped the way we live and interact with others. It got us thinking about what technology will be like in the next 100 years and boy are theories flying around –some very interesting, and some that are downright scary to think about! Here are a few ideas that are either in the works or that many technology experts predict will be developed which will, once again, drastically change the way of life for everyone.

Self-Driving Cars

This is happening already. Google has a driverless car project currently in progress and they are testing cars out on the road. Even though Google has no plans to commercially develop the system, it is believed that by 2025, driverless cars will be the norm.  As a matter of fact, 4 states have already approved the operation of autonomous cars; but, some still require a human to be in the car.

According to CNN Money, Nissan says it will offer a driverless car by 2020, while the Audi A7 is currently developing a “traffic jam assistant” which will allow the car to travel up to 40 mph in heavy traffic without assistance from the driver. That feature, in particular, focuses more on a “piloted” driving car than a driverless car.

Other car executives want “autonomous” or “assisted” cars to be developed. Either way, it is clear that the way we drive will be changed dramatically. Some technology experts are predicting that by 2030, all cars on traveling on major roads will be under control of satellite and roadside control. 

Advanced Robots

While robots are already being widely used in manufacturing, warehouses, and laboratories, the use of robots is predicted to increase dramatically over the next few years. We currently have robotic vacuum cleaners and surgical robots. Now, add in the fact that technology is rapidly increasing the power of microprocessors and artificial techniques. This will result in
robots increasing their potential as flexible automation tools. It is predicted that robots will take over most service industry jobs such as fast food service, housecleaning, and retail sales by 2030. Consequently, it is also predicted that by 2055, more than 50% of Americans could be unemployed by robots.

In addition, the future of the military may look like something out of a present day movie! Robots may be used in warfare or “super soldier” may be created who could be deployed anywhere in the world within hours and remain in the field for extended periods of time. Their bodies and performance could potentially be enhanced through nanosensors that constantly
monitor their medical status, embedded nanoneedles that release drugs when needed, and possibly even nanorobots that can quickly heal wounds in the field.

Virtual Animals

It all started with the Tamagotchi in the 90’s. Do you remember the small keychain computer kids were dying to have so that they could have a “pretend” pet that needed to be fed, walked, and cared for? Well, that was only the beginning. Currently, solid objects can be digitized by laser scanning them and a 3-D model can be made. Soon, you will be able to input the
pet’s basic personality and actions, and potentially recreate a deceased pet. Advancing from that, there will be full blown artificial intelligence driven robots that will be almost undistinguishable from the real thing.

Wireless Recharging

How great is the thought of not having a drawer full of tangled, unused and out dated chargers?! Instead, you would be able to simply put your device on top of another device –and the first consumer products might be debuting sometime this year! This product will focus on charging smartphones and maybe even laptops.

Within the next 20 years, wireless charging stations will be at restaurants, airports, coffee shops, bars, you name it. But, wireless charging won’t stop there. Kitchen appliances will be powered by the kitchen counter and big appliances such as refrigerators will utilize wireless charging, thus cutting down on production costs and eliminating power converters.

Universal Translator

No longer will people struggle in school to learn a second language or face a language barrier while traveling to foreign countries. According to InfoWorld, Google, Facebook, Microsoft, and other technology companies are working on a device that will be known as a universal translator – something reminiscent of “Star Trek.”  The handheld device will be an accurate, real time translator that will convert live conversations instantly and correctly.

Augmented Reality

Augmented reality is already starting to appear in the tech world. For those who still don’t fully understand what augmented reality is, let me explain... According to Total Immersion, augmented reality can be defined as the integration of digital information with live video and the user's environment in real time. Devices used for augmented reality are commonly those
of a computer, a camera, a processor and a screen. Augmented reality recognizes a visual picture or film, blends new information, and displays the virtual result.

In the next 50 years, augmented reality will be just as common as Skype or Face Time – just way better! There will be virtual fitting rooms for online shopping; corporations will use it as a marketing tool to make segmented reality games; GPS will be forever changed by being able to display an enhance real time map that shows everything from restaurants to grocery stores; schools will use it to recreate historical events; activate books into 3D images; and present structures of the galaxy in real time. Also, soldiers (if any are still around) will use it to
have detailed, 3D maps and doctors will be able to perform surgeries from across the world!

Do you agree with these predictions? What are your predictions for the future of technology?

Topics: Industry Trends, Industry News, Information Technology

View York Solutions Jobs of the Week!

Posted by Danielle Toste on Thu, Apr 10, 2014 @ 09:04 AM

Don't miss out on your next IT job opportunity!

Position: Solutions Architect

A client is looking for a Solutions Architect for a 6-9 month contract in Hopkins, MN. A background in healthcare insurance is preferred with exposure to claims, health and wellness, and Medicade/Medicare being a benefit. The ideal match will be comfortable interacting with the team and find answers needed to complete the tasks. This person will play a crucial role in multiple functions.

This position was posted on 4/7/2014. Click Here for more details!

Position: Data Architect

A client in DePere, WI is looking for a Software Engineer that will be responsible for researching content management solutions to information technology, work with businesses to understand requirements and provide solutions, create new application components, and design and develop user interactions using C#. Net, HTML, and CSS. Candidate must have at least 5
years of experience with Object Oriented design, HTML, Javascript, CSS, C#, .Net 4.0, .Net 4.5, and proven mentoring skills.  

This position was posted on 4/7/2014. Click Here for more details!

Position: SAP Finance Lead

A client in East Chicago, IN is seeking a SAP Finance Lead for a permanent position. This person will possess understand the overall SAP direction and create high level view of end state FICO process. He/she will work with other IT teams in order to respond to business needs and support SAP production environment. This person will also configure SAP-ECC  system and create rapid prototypes to demonstrate how requirements will be satisfied. Candidate must have a degree in Computer Science, Information Systems, or equivalent experience and preferably has a master’s degree in Business Administration.

This position was posted on 4/8/2014. Click Here for more details!

Position: Senior Java Developer

One of our clients in Minnetonka, MN is looking for a contract to hire Senior Java Developer for a large healthcare client. This person will preferably have healthcare experience, Java experience, web services and Groovy or Grails.

This position was posted on 4/7/2014. Click Here for more details!

 

Want to know more? View all of our open IT contract positions by visiting our Job Seekers page!

Topics: ITJobs, IT Hiring, York Solutions jobsoftheweek

Ask a York Recruiter- The Resume Conundrum

Posted by Danielle Toste on Tue, Apr 8, 2014 @ 14:04 PM

Grab your resume. Set a timer for six seconds. Start the timer and read your resume until the timer goes off. What stuck out from your resume? Were you even able to interpret much from those six seconds? Well, according to many recruiters and hiring managers, on average, they spend six seconds skimming a resume. Yes, you read that right. Six seconds! We wanted to find out if this is true and discover what recruiters look for on a resume. So, we asked a few York recruiters and you might be surprised by what they told us. 

6 Seconds is Not Enough Time to Review a Resume

“I feel like I can get a pretty good gauge on whether or not a person would be a good fit, but of course you need to spend more than 6 seconds looking at the resume,” said Corey Johnson, Manager of Consulting Services at York Solutions. “Things I look for in order to gauge fit are
relevant past experience, experience at large, reputable companies, and long-term engagements versus short 2-3 month contract positions.”

Noel Novacek, Manager of Consulting Services at York Solutions, also agrees that he takes way
longer than six seconds. So, that is a sigh of relief that your resume is getting a decent amount of time being reviewed.

Resume Format is Key

Both Noel and Corey agreed that if a resume has a “clean” look and is organized, this tells the recruiters that the candidate is an organized, detail-oriented person which is an essential quality in an IT professional. It is also recommended that a candidate does not use smaller than 11 point font or a font that is too fancy.

Do Not Use Third Person and Keep the Personal Details to a Minimum

It is a quick way to get your resume thrown to the side. Also, leave out the overly personal information. For example, our recruiters occasionally get resumes that share too much detail
about a candidate’s life. While recruiters definitely enjoy learning more about
who a candidate is, it might be best to save those details for the
interview.  Those extra details may make take away valuable space on your resume where you could be sharing additional professional achievements which are most important to hiring managers.

Triple Check Spelling and Grammar

If you keep your resume professional, free of errors, concise, and relevant to the job to which you are applying, you will greatly increase your chances of your resume standing out which might just lead to a job interview. So, once again, attention to detail is key!

What do you think is most important for an IT professional’s resume?

Topics: ITJobs, IT consulting, Job Search, Employer Insights, Fun, Professional Development, IT Job Search, IT Hiring, Information Technology

See York Solutions Jobs of the Week!

Posted by Danielle Toste on Thu, Apr 3, 2014 @ 09:04 AM

Position: Enterprise Principal Architect

A client is looking for an Enterprise Principal Architect for a 6-9 month contract in St. Paul, MN. Candidate will be responsible for technical and architectural leadership, establish and maintain a trusted advisor relationship with IT and business leaders, and conduct studies on the latest technology developments. This person must have at least 5 years of experience in a midsize or large corporation supporting multiple lines of business with global presence, 3 years of experience leading development enterprise systems integrations strategies, and at least 10 years of experience in at least three of the following: EAI, ETL, ESB, SOA, Web services, B2B
integration, EDI, and/or message brokers.

This position was posted on 3/31/2014. Click Here for more details!

Position: Data Architect

A client in Hopkins, MN is looking for a Data Architect with experience in data analysis, data profiling, data integration, and data quality. This person will be responsible for defining, analyzing, review architecture and technical requirements, as well as recommend DBMS and ETL tools and technologies for structured and unstructured content. Candidate must have at
least 12 years of experience in software development and database application with the majority of experience in data strategy, souring, modeling, integration, and architecture.

This position was posted on 3/31/2014. Click Here for more details!

Position: Systems/Data Analyst

A client in Hopkins, MN is seeking a Systems Analyst II for a 6-9 month contract. This person will possess a general understanding of the technologies and applications supporting business and will research complex data, process, and integration issues.  Candidate will need to have a Bachelor’s degree in Information Technology (or degree in related field or equivalent work
experience) and have experience with client server and thin-client application support.

This position was posted on 4/1/2014. Click Here
for more details!

Position: Information Architect

One of our clients in Minneapolis, MN, is looking for an Information Architect who will provide data strategy and governance oversight for a focused portion of the client’s information architecture. This person must have working knowledge of core elements of “Open Web” framework, proven experience with designing and developing mobile apps for iOS and/or Android, and web application with Rich User Interface.   

This position was posted on 4/1/2014. Click Here for more details!

 

Interested? View all of our open IT contract positions by visiting our Job Seekers page!

Topics: Blogs, ITJobs, IT industry, Job Search, Company News, IT Job Search, IT Hiring, Information Technology, IT Skills

We Won’t be Hacked: Top 10 IT Security Myths

Posted by Danielle Toste on Tue, Apr 1, 2014 @ 13:04 PM

Security breaches happen every day. Some are as small as a person disputing a $50 fraudulent charge on a card to huge security breaches, such as the Department of Veterans Affairs, that resulted in 26 million veterans, active-duty, military personnel, and spouses information being compromised. With IT security being a hot topic and consistent news story in the media, we decided to take a look at some of the top IT myths and how to combat them.

Myth 1: We won’t be hacked

No matter what type of security system businesses have in place, there is always a possibility for a breach. Face the business responsibility to confront security-related requests and make use of a security classification framework. 

Myth 2: We have physical security (or SSL) so you know your data is safe

This myth is associated with not understanding the risk. Ensure that security purchases match data requirements.

Myth 3: Regular expiration strengthens password systems

Research shows that having regular password expiration may not be useful and that it should be done randomly. Although, stopping passwords from being hacked completely might not be possible, this is at least one way to try and prevent it.

Myth 4: Moving the CISO outside of IT will automatically ensure good security

Moving the services won’t stop a company from being hacked. They need to find the area of weakness in their security programs.

Myth 5: Adhering to security practices is the CISO’s problem

Passing off the problem to another business unit won’t solve the issue either. A company should build an information security program around their culture.

Myth 6: Cyber security is a technical issue for which executive level business management has little or no ability to contribute

Even though this statement might not be said, this is implied thru behaviour. It is management’s responsibility to define a security policy for the overall organization and that requires management to accurately understand what is needed in a security plan.

Myth 7: IT is, and should be, responsible for cyber security

Yes, IT is responsible for enforcing, preventing, and/or detecting behaviours defined by the company’s security policy. Yet, IT should not be making decisions about who should or shouldn’t be able to access information. That comes down to the myth above-- management.

Myth 8: Being compliant makes us secure

Just because a company passes a compliance audit does not ensure that one is properly secure. It only means that the requirements for a particular regulation or compliance have been met. A company could be overspending to meet the requirements and still not be secure. Businesses should focus on improving their security while still meeting the standards.  

Myth 9: Any computer virus will produce a visible symptom on the screen

Many people think that a computer with a virus will start acting up. Not always the case. A computer can run fine and still have malware on it. The only way to know 100% is by having the device scanned regularly.

Myth 10:  We have a firewall on our network, of course we’re protected!

Just having a properly configured firewall will not protect anyone against malicious content encapsulated over an SSL connection.

 

While being protected from all security attacks might not be possible, understanding of risk and having a thorough security policy that is implemented and regularly changed to keep up with new threats will greatly reduce your chances of being attacked.

 

What IT security myths have you heard?

 

References:

http://www.botzandassociates.com/blog/5-cyber-security-myths/

http://www.infoworld.com/slideshow/33387/the-top-13-security-myths-187168

http://www.networkworld.com/news/2013/061113-gartner-reveals-top-10-it-270738.html

Topics: Blogs, IT Security, IT industry, Industry Trends, Information Technology