ARTICLES, BLOGS & VIDEOS

The latest news, trends and information to help you with your recruiting efforts.

Posted May 07, 2015 by

How to keep your computer and online accounts safe from internet crooks

Shield antivirus and laptop, abstract (done in 3d)

Shield antivirus and laptop, abstract (done in 3d). Photo courtesy of Shutterstock.

The internet bears a love/hate relationship from many people. Whether you are a consumer using the internet to find a new dentist or check your e-mails or you are a business that operates predominantly online, there are thousands of reasons for you to be online. Whether you spend five minutes or five hours at a time online, you must make sure that you are secure. Just one little slip up can cause you to be at the mercy of those pesky internet crooks. You do not have to be a computer guru, nor do you need any type of degree; there are many easy ways to keep your computer and your personal information perfectly safe. (more…)

Posted January 16, 2015 by

Bedroom Hacker? You Can Get a Career From That

Professional hacker working on laptop

Professional hacker working on laptop. Photo courtesy of Shutterstock.

Hacking has long been considered the “black magic” of the Internet and tech communities. There are strict laws in place that are meant to prevent hackers from breaking into websites, databases and other prime online targets for malicious reasons.

Hackers who’ve been in the game for years often seek employment in other sectors. Their hacking skills are kept secret because anonymity can mean the difference between freedom and time behind bars, and frankly, just because being anonymous is “the thing to do” among hackers. Development in recent years, however, have led many would be criminal hackers on the path to success as gainful employees in the information security industry. (more…)

Posted September 17, 2014 by

The Impact of Industrial Cyber Attacks Affect Everyone

Silhouette of a hacker uses a command on graphic user interface

Silhouette of a hacker uses a command on graphic user interface. Photo courtesy of Shutterstock.

Most people are taking steps to protect their private information. They are careful about who they provide their information to and they make sure that they follow basic rules of safety when they are using their computers. Hackers are still going to try to steal private information in any way they can, but they are having to work harder to do it. (more…)