Freddie will be responsible for service team leadership, driving growth and excellence in service delivery, as well as serving on the Mythos leadership team.  Freddie has a passion for excellence and a demonstrated ability of developing and managing high performance teams. He is an accomplished executive, with 15 years’ experience in technology and is skilled…

Read More

By James Laszko In my previous article NIST – Achieving Alignment in Cybersecurity we discussed how the National Institute of Standards and Technology (NIST) created the Cybersecurity Framework (CSF) to give businesses foundational structure and common language to address their own individual security needs. We established that some form of cybersecurity posture is necessary to…

Read More

Technology has always been a dynamic market. Traditional focus has moved from a hardware/software to virtualization and the cloud but data has clearly been designated as the true prize and in the unpatrolled world of the Internet, it is up to you to secure it. You can have the fastest car in the lot but…

Read More

used with permission from HTS One of the most popular and longest lived Microsoft operating systems that we all know and love, Windows XP, has almost run its course. The clock is ticking… And on April 8, 2014, Windows XP will officially be “dead”, with no more extended support, and—more importantly—no more security patches. Hopefully,…

Read More

used with permission from Norton by Symantec by Marian Merritt If you were to think of software like you would a houseplant, maybe it would be more natural to keep it patched and up-to-date. To take care of your plant, you’re supposed to water it, turn it in the sun for it to grow evenly…

Read More

I’m no Word Queen. I get by just fine typing text, inserting the odd table here and there, and mashing the keyboard when my floated images won’t stay in place. But occasionally I need a more advanced tool (like Convert Text to Table – a lifesaver!). I’m excited to dig into Word 2013 and see…

Read More

used with permission from SBA.gov by Caron Beesley Budgets are difficult to plan and maintain at the best of times – unexpected events, cash flow problems, supply chain issues and more can all reap havoc with even the most thoroughly planned business budgets. The other problem with budgets is that many of us set budgets…

Read More

used with permission from Technology at Work It’s a simple symbol – two lines intersecting two lines. It’s been known as the number sign, the pound sign and the hash mark. It’s used for different purposes in linguistics, mathematics and computing. Of course, we’re talking about the # symbol. It’s a simple sign, but one…

Read More

used with permission from Technology at Work OK, you’ve made the decision to move to the cloud. It’s now time to determine which cloud solution and set of supporting services is right not only for you, but potentially for your clients. After all, you’re also working with and safeguarding their data assets. As we’ve previously…

Read More

Facebook Privacy Settings Got You Down? Here’s a Guide! Rik Ferguson: Making the Most Out of Facebook’s Privacy Settings Facebook’s privacy settings – opaque at best to even the savviest users and constantly changing – can seem like a hurdle even when you’re strongly motivated to lock your account down. Rik Ferguson, Vice President of…

Read More