Govtech.com
June 30, 2012    /    by

Vacation WiFi: What Networks Can We Trust?

I was recently on vacation with my family in Ocean City, Maryland. As I powered up my iPad from our fifth floor condo on 136th Street, more than a half dozen wireless networks popped up. I asked myself: Can I use (or trust) any of these? Are they free? Is it worth the risk, if they are?

June 16, 2012    /    by

Favorite Survival Tips for Using Social Media

What's appropriate and what's not regarding the use of social networks? Beyond formal codes of conduct at work, what behaviors and attitudes will likely lead to trouble? What tips can we share from those who have gone before us and learned about the good, the bad and the ugly? What good habits enable a positive experience in the long run? And, what are some examples of social media technology being used in destructive ways that undermine relationships?

June 10, 2012    /    by

Advice Following LinkedIn Hack: Change, Don't Reuse, Your Passwords

Computer experts from around the world are warning users to change passwords immediately following the announcements that millions of passwords from LinkedIn, eHarmony and Lastfm were posted on hacker websites.

June 4, 2012    /    by

Front Page Cyber: Stuxnet and Flame have Changed the Discourse

A new era began this weekend in cyberspace. Starting with the New York Times article dated June 1, 2012, which proclaimed: Obama Order Sped Up Wave of CyberAttacks Against Iran, the global discourse regarding cyber attacks has now shifted.

May 28, 2012    /    by

How Do Social Networks Get Hacked? A Lulzsec Case Study

How do social networking sites get attacked by hackers? What methods are used? Why are attacks successful? What can be done to improve security on social networks?

May 20, 2012    /    by

Reinventing (or Removing) Cash Registers with new Shopping Security

Ever since I read Megatrends in 1988, Ive been fascinated by predictions about how technology will alter our daily lives in the near-future. One area that is evolving quickly is our shopping experiences both online and offline.

May 12, 2012    /    by

How Multitasking Hurts Our Productivity

Most of us always trying to do multiple activities at the same time. But is it really working?

May 6, 2012    /    by

Listening to the Noobs on Security - Or Not?

How much attention should cyber pros pay to comments from the "noobs" about technology and security?

April 28, 2012    /    by

Poll: What's Happening With BYOD in Government?

Opinions are all over the map on "Bring Your Own Device" (BYOD) to work. Here are some viewpoints and a poll.

April 22, 2012    /    by

Dark Clouds Over Technology: Pondering Action After Recent State Government Data Breaches

Over the past few weeks, there have been several high-profile breaches announced involving state government systems - one in South Carolina and one in Utah. My first reaction was to think: There but for the grace of God go we.