Be a Role Model Another way to say this is to practice what you preach. Information security practices are a top down process. Do you have a content filtering system in place designed to prevent employees from accessing malicious sites? Have you asked your IT department to bypass it? Practicing what you preach and abiding […]
Mythos Technology is an IT consulting and management firm. For more information, please visit www.mythostech.com or call (951) 813-2672.
- Posts: 4
- Website: http://www.mythostech.com
Intelligent Systems Technology—although you may not be familiar with the phrase, there is another which I’m sure will ring a bell—Artificial Intelligence or AI. Artificial intelligence systems have grown in leaps and bounds within the past decade. Perhaps the most famous face on the current cutting edge of the field is IBM’s Watson, the super-computer […]
In a nutshell, a Bring Your Own Device environment is as simple as it sounds—it allows employees to work using their own devices. Generally the device of choice is a smart phone, but in some environments this may include tablets or laptops. In a BYOD environment, an employee’s personal devices are allowed to interact with […]
Payment Card Industry Data Security Standard, or PCI DSS, may not be something you’ve heard of. If you have, you’re probably aware what a headache is can be for businesses to meet the stringent standards laid out by credit card companies in order to be certified PCI compliant. Compliance is a complicated issue, but what […]