What You Say Can and Will Be Used Against You: Personal Rights and Social Media
Recently in Aurora, Colorado, a young man put on Facebook that he had hit a vehicle when he was drunk and didn’t stop at the scene of the crime. Within […]
Recently in Aurora, Colorado, a young man put on Facebook that he had hit a vehicle when he was drunk and didn’t stop at the scene of the crime. Within […]
Right now the IT industry is what the shoe industry was in the 1500’s. Back then, if you went from village to village, each cobbler made a different sized shoe. […]
To someone unfamiliar with Standard Operating Procedures, having SOPs may not seem necessary or applicable. Increased profitability, on the other hand, is something sought by all business owners. Have you […]
As a small business owner, I’ve learned that running a business comes with three main struggles: not having enough clients, not having enough revenue, and being “held hostage” by my […]
A few weeks ago, pro-ISIS hackers broke into the YouTube and Twitter accounts for US CENTCOM and sent embarrassing tweets and videos. During the same weekend, another group of criminals […]
Raj Goel, CISSP CTO Brainlink International, Inc. raj@brainlink.com 917-685-7731 Raj’s LinkedIn profile This article was published in Issue 6 of InfoSecurity Professional Magazine The search giant saves a lot of […]
I am excited to share this with you that I spoke on a weekly program recently called “Coffee Break With Sabra” about an issue of great importance affecting you and […]
HIPAA at it’s core says that patient data belongs to the patient and must be produced on demand. Banking laws says that the client’s funds belong to the client, and […]
Our success as an MSP and a solutions provider rests on 3 foundations: 1) Improving Client Security – I’ve built my career on improving security, safety and increasing productivity for […]
Raj Goel, CISSP Raj Goel Security & Compliance Consulting Practice www.rajgoel.com raj@rajgoel.com 917-685-7731 Raj’s LinkedIn profile This article was originally published in INFOSECURITY PROFESSIONAL Magazine July/August 2014 issue. To read […]