MSPDOJO – Using SOPs for Consistency and Quality
Right now the IT industry is what the shoe industry was in the 1500’s. Back then, if you went from village to village, each cobbler made a different sized shoe. […]
Right now the IT industry is what the shoe industry was in the 1500’s. Back then, if you went from village to village, each cobbler made a different sized shoe. […]
To someone unfamiliar with Standard Operating Procedures, having SOPs may not seem necessary or applicable. Increased profitability, on the other hand, is something sought by all business owners. Have you […]
As a small business owner, I’ve learned that running a business comes with three main struggles: not having enough clients, not having enough revenue, and being “held hostage” by my […]
A few weeks ago, pro-ISIS hackers broke into the YouTube and Twitter accounts for US CENTCOM and sent embarrassing tweets and videos. During the same weekend, another group of criminals […]
Raj Goel, CISSP CTO Brainlink International, Inc. raj@brainlink.com 917-685-7731 Raj’s LinkedIn profile This article was published in Issue 6 of InfoSecurity Professional Magazine The search giant saves a lot of […]
I am excited to share this with you that I spoke on a weekly program recently called “Coffee Break With Sabra” about an issue of great importance affecting you and […]
HIPAA at it’s core says that patient data belongs to the patient and must be produced on demand. Banking laws says that the client’s funds belong to the client, and […]
Raj Goel, CISSP Raj Goel Security & Compliance Consulting Practice www.rajgoel.com raj@rajgoel.com 917-685-7731 Raj’s LinkedIn profile This article was originally published in INFOSECURITY PROFESSIONAL Magazine July/August 2014 issue. To read […]
On Oct 23, 2014, Raj presented his legendary “Architecture Of Global Surveillance” presentation with brand new content on Disney’s surveillance technology. Snowden, Anonymous, NSA, FBI, GCHQ, Boeing, China, Cisco, ATT, […]
As I read about the HOME DEPOT breach, follow the commentaries on the TARGET breach and other breaches, it’s clear to me that we need to have a more mature […]