The 4-Hour Workweek: Escape the 9-5, Live Anywhere and Join the New Rich by Tim Ferriss – A Book Review

The 4-Hour Workweek: Escape the 9-5, Live Anywhere and Join the New Rich by Tim Ferriss – A Book Review

Summary Tim Ferriss’ provocative book, “The 4-Hour Workweek,” throws a wrench into the traditional work-life balance paradigm. Questioning that success necessitates a 40-hour workweek grind, Ferriss proposes a radical approach to design a life of freedom and financial independence. The book unfolds in four parts: 7 Key Takeaways: Why You Should Read It “The 4-Hour…

|

Adobe, Microsoft Issue Critical Security Fixes

Adobe and Microsoft today each issued security updates to fix critical vulnerabilities in their software. Microsoft pushed 14 patches to address problems in Windows, Office, Internet Explorer and .NET, among other products. Separately, Adobe issued an update for its Flash Player software that corrects at least 18 security issues. Microsoft announced 16 bulletins, but curiously two…

|

Small Business Owners Can’t Afford to be lax on Security

It appears that consumers are certainly becoming more proactive about protecting themselves from identity theft. But small business owners don’t seem to share their concern. According to a recent survey, small business owners are victims of fraud at a rate of 15 percent more than the general population. In 2010, small business owners lost about…

| |

Social Networking Sites: Security and Privacy Issues

Recent hacks involving several high-profile social networking accounts once again highlight the potential vulnerability of social media. The sheer volume of users and the information that gets posted on social media sites create plenty of opportunity for an attacker to use social engineering or other methods to gain access to the accounts of individuals and…

|

The PPPS of Documentation

Many companies and people get confused when it comes to policies, procedures, processes and standards.  Here is a short definition of each to help you understand the differences and how they work together. Policy: Business rules and guidelines of a company that ensure consistency and compliance with the company’s strategic direction.  The Policies lay out…

|

New security threat at work: Bringyour- own-network

Even as IT pros wrestle with the bring-your-own-device (BYOD) trend, corporate security is being further complicated by another emerging trend: bring your own network (BYON). BYON is a byproduct of increasingly common technology that allows users to create their own mobile networks, usually through mobile wireless hotspots. Security professionals say BYON requires a new approach…