We’re honored and happy to announce that our work with the North Carolina Department of Public Instruction (NCDPI) has been named a finalist for the 2016 Info Security Global Excellence Awards in the Best Deployments and Case Studies category. What an exciting way to kick off 2016.
The full-time salaried position is no longer the dominant worker classification that it was in the 1990s or even 2000s. More and more companies, focused on cutting costs, are employing contingent workers to avoid paying taxes and healthcare benefits on those workers. And more and more workers, led by millennials, are seeking contingent-based employment, desiring the flexibility and freedom that comes with those positions. This new economy we live in, defined by technology, sharing and innovation, is changing how we work.
You may be working alongside one of them and not even realize it: a substitute teacher, an adjunct professor, or a special education contractor. They’re all contingent workers - employees hired for a time period of one year or less with a specific end date; they could be full-time or part-time. Over the past decade, a trend has emerged in academia of these contingent workers being hired, and we’ve seen it accelerate at an increasingly high rate over the past few years.
Photo by Ludovic Bertron
James Bond is known for impeccable taste in clothes, cars and cocktails. Not to mention, cool gadgets and tricks up his sleeve like wristwatch lasers and passenger ejector seats. Along with the style and grace, keeping data safe and intelligence top secret is still top of mind for Bond.
In a previous post, we discussed about understanding how, and if, new educational apps align with your school’s data and student privacy policies. With the overwhelming amount of educational apps currently available and new ones popping up everyday, it can sometimes be difficult to shuffle through them to find those that meet the teacher’s need and also provide the security needed to protect the personal information of the teachers and students using them. With all that in mind, we’ve compiled a list of top ranked educational freemium applications that we came across in the marketplace this year.
Whether you’re a teacher or an IT admin, you’ve probably seen a number of articles and blog posts recapping the best new apps for the classroom released in 2015. Since we speak so often with schools around the country, we’ve heard a lot about all these apps -- good, bad and otherwise. We also realized there’s something far more important to convey to you as you look for potential apps to use in the classroom.
The 2016 SC Magazine Awards are coming up in March and Identity Automation has been nominated as a finalist in the Best Identity Management Solution category. The awards program has over 30 categories and also represents the very best players of innovation, of leadership and of passion.
With the upcoming holiday shopping season, make sure to beef up your security preferences on your Amazon account. The online retail giant has given users the option to enable two-factor authentication (or 2-step verification) on their accounts. Mobile-friendly ecommerce sites like Amazon’s have made us click-happy, but also easier for hackers to obtain your personal information, credit card numbers and passwords saved in your favorite internet browser.
The Department of Defense and other federal agencies with national security responsibilities need extra layers of protection to efficiently secure data, especially from the inside. For this critical level of protection, many organizations employ a variety of technologies, including advanced endpoint protection, database activity monitoring, and identity and account management tools, not only to help guard against internal threats, but to also manage their systems more efficiently.
current_page_num+2: 20 - disabled