Join Us For a Cranky Middle Manager Webinar
Some of you may not know, but I host a podcast called, "The Cranky Middle Manager Show". It has a worldwide listenership of tens of thousands of oppressed middle managers. Well we will be holding our second webinar- "Managing Remote Employees-Using Webmeetings To Keep Them Engaged" (Read more about it here)
The webinar will be:
Tuesday, January 29th 9 PM Central time (US)
Wednesday January 30th 2 PM Melbourne (Australia)
We will be using DimDim which is cool because there is no phone to dial in. All audio will be on the web, so all you need is a set of speakers or headphones. Of course, if you want to participate by voice, if you have a microphone we'll take your questions that way. It's a fun, interactive session with great people from around the world.
We limit seats to 20 people for optimum participation (there's a tip for you!) so let us know right away if your'e interested.
Just use the contact box on the right there and let us know you're interested.
- achis's blog
- Login or register to post comments
Keystroke loggers are a
Keystroke loggers are a particularly dangerous security threat because users typically don't realise they're even there web design services.
More and more people have made the switch to using the Internet for personal tasks -- online bill paying and shopping are just two examples. But while companies tout the convenience of using the Web for such purposes, the security threats continue to mount wireless internet providers.
That's why user education is so important. Teaching users best practices for being safe on the Web can help mitigate some of these threats. But it's also important that users understand the full extent of the risks internet phone.
For example, using an encrypted link (i.e., HTTPS rather than HTTP) to access bank or e-mail online is a good way to encrypt the transmission of private information as it flows across the Internet. However, it's vital to remember that the encryption process doesn't take place until the information leaves the machine. This creates a vulnerability that some people may not be aware of -- keystroke logging internet service providers.
Keystroke loggers are a dangerous security threat, particularly because -- like other forms of spyware -- the user can't detect their presence. Let's look at the different versions of keystroke loggers and discuss what you can do to protect your organisation and your users from this threat.
Keystroke loggers are available in either software or hardware versions. They can store everything a user types without the user ever knowing they're even there.