Top IT Jobs for 2010

Top IT Jobs for 2010

Looking over this list, it isn’t surprising to see the following as the top IT jobs for 2010.

  • Information Systems Auditor
  • Computer Forensics
  • Database Administrator
  • Software Engineers
  • Network Administrators
  • IT Security Manager
  • Virtualization Engineers
  • Project Manager
  • Voice Specialists



companies

Top IT Job 2010

[divider_top]

Things You Should Do To Protect Against Identity Theft

Things You Should Do To Protect Against Identity Theft

Identity theft is considered to be one of the fastest growing crimes. Here are some things you should do to help protect yourself.

  • Check your mail often
  • Don’t just throw it out, it could contain personal information
  • Shred, shred, shred (bills, receipts, statements…)
  • Protect your social insurance number
  • Limit what you carry in your wallet and keep a list
  • Log off / lock your computer
  • Lock your home at all times
  • Keep sensitive documents safe
  • Double check yur bills and statements
  • Check credit report regularly
  • Limit number of credit cards
  • Use a credit card with a small limit for online purchases
Identity Theft

Identity Theft

What else do you suggest?

[divider_top]

Do You Own a Laptop? Treat it like your wallet!

Do You Own a Laptop? Treat it like your wallet!
  • Most thefts occur from cars. Many people just want to quickly go in to a store on their way from work. Hiding the laptop from sight doesn’t provide much safety, especially if you place it in the trunk upon arriving which gives the thief visual confirmation of the prize.
  • If your laptop bag is too heavy to carry with you, get a lighter one. There are many different styles available now, many are padded and comfortable to wear on your back like a backpack or shoulder strap. I have seen that Best Buy tends to carry a large selection.
  • Encrypt your files or entire laptop hard drive. Stolen laptops are typically destined for a quick resale which means that your unencrypted files could end up anywhere.
  • Regular backups will help ensure quicker recovery.
  • Treat your laptop as you would your own wallet.
Stolen laptop

Laptop Security

[divider_top]

Permanent Digital Footprints and Private Data

Permanent Digital Footprints and Private Data

Digital Fingers
I am always surprised at how trusting people are with confidential and “private” data. They send attachments by email, they chat and post updates/pictures through their facebook/blogs/twitter accounts. And yet people are shocked when they hear about identity theft. You are shocked when someone knows your name, birthday, what you look like, what your kids look like, and how much your last raise was at work along with the particulars of the big deal you just closed.

It is very simple actually. We are all leaving a “digital footprint” in everything we do online and on our computers. Just because you delete something doesn’t mean it is gone. I was on the news a few years ago doing an “experiment”. We took 4 computers from the eco depot and I was able to recover data from every one of them including a copy of someone’s will, list of their stocks/jewellery and combination to their safe. This computer had already been “recycled” twice since the original owner gave it away.

While discussing network security with a good colleague of mine, he pointed me to yet another interesting site, pipl.com – go ahead and search your name, you may be in for a surprise on what this digs up about you. Sure enough there are even some newsgroup postings I had made back in the 90s that are showing up along with different projects I have been involved with. Quite enlightening. And there is no way for me to “delete” them, they are out there, probably many copies of the information being archived on different servers.

But I digress…

The reason for this this update was to remind and/or increase awareness of something called the US Patriot Act. Why should you care? This is a topic I think about often and bring up when conducting audits of individual and corporate networks. Any data that is routed through the US opens the possibility that it can be intercepted by US authorities. No longer do they require a warrant but now can do it quite simply with something similar to an administrative subpoena called a national security letter. Along with this goes a gag order such that the custodian of the information/data that is being examined/requested is not allowed to tell anyone that this demand has been made.

Many people use Facebook/Twitter which have data that reside on US based servers. How about where your website is located? Does your website have a private database, do you maintain information about your clients? How about something as simple as gmail/yahoo/hotmail/msn/googledocs/etc Did you know that everything could have already been examined without your knowledge?

Perhaps this is not a big deal for individuals but it is certainly very serious for organizations.

Many clients don’t even know where their data is being stored! We also find that many companies that provide website and email hosting, or even IT support services, make use of reselling other services offered online typically from these very large hosting providers (typically located in the US). Offsite backups, email accounts, databases, etc all could be stored on a US based server without your knowledge and you thought you were dealing with a local company.

The US Patriot Act was passed by US Congress following the 911 terrorist attacks. Canada also enacted a legislative response called the Anti-terroism Act.

I would caution you to educate yourselves regarding where is your data stored and transmitted, are there privacy concerns that should be investigated and addressed, and ensure you aren’t violating any laws (such as the privacy act).

[divider_top]

Internal Fraud

Internal Fraud

Enter PasscodeUnfortunately economic slowdowns can lead to downsizing, forced days off without pay, or lay offs.

This can be dangerous in the world of Information Technology [IT] where disgruntled employees may retaliate against their (former) employers.

Be cautious in these situations where the corporate decision has been to cut back in this area as typically these individuals have access to files and corporate information.

Ensure you have the right policies in place, safeguards, security measures, offsite backups, documentation, and knowledge to help protect the company from any issues. Unfortunately not all problems present themselves and sometimes they don’t surface for months down the road.

Auditing your companies IT infrastructure should be done on a regular basis, worst case once a year. This should be expected and not a surprise. It can help discover potential problems before they manifest themselves later on.

Many surveys have been conducted on fraud and it is generally concluded that the majority of fraud found within companies is committed from within.

————

Note that the above is regarding any employees while below is IT specifically…

————

IT to generate 5.8 million new jobs by 2013: IDC

“IDC predicts that the IT industry will be an engine powering economies out of economic doldrums, creating more that 75,000 new businesses in the next four years and adding jobs at a rate of 3 percent annually.

‘Countries that foster innovation and invest in infrastructure, education and skills development for their citizens will have a major competitive advantage in the global marketplace,’ said Microsoft chief executive Steve Ballmer.

‘In this fundamental economic reset, innovative technologies will play a vital role in driving productivity gains and enabling the creation of new local businesses and highly skilled jobs that fuel economic recovery and support sustainable economic growth.'”

More… http://www.physorg.com/news173940306.html

[divider_top]

Something For Everyone (Movies, Long Distance, Remote Access)

Something For Everyone (Movies, Long Distance, Remote Access)

Apple Logo

“Apple TV redefines what your TV can do. Rent HD movies. Buy HD TV shows. Listen to your iTunes music. Watch podcasts. Even show off your photos.”

Aside from viewing video clips on YouTube or pictures on Flickr, I must say that this device is amazing purely from the simplicity of renting movies.

Right now to rent a movie, you probably have to jump out to your local blockbuster, rent a video, hope it is there, then having to bring it back to avoid late fees, very inconvenient. Not to mention all the careless people who scratch the discs and it can’t play beyond some crucial point in the movie. How frustrating!

With Apple TV, you can rent from movies online, that are available on demand, and it is only $2.99 for older titles, $3.99 for newer titles, and $4.99 for HD movies. The rental is good for 48 hours and can be played multiple times.

For those of you who like movies and convenience, something to think about.

————-

LONG DISTANCE

Skype LogoMore and more people are needing to reach out to business associates, clients, family and friends who are located (perhaps temporarily) outside of their calling region. Skype keeps improving their product and is worth trying out. It is free. And it also allows you to use a webcam (many laptops have them built-in) for a video conference. It is quite impressive.

LogMeIn LogoIf you need to access your computer remotely, I would highly recommend you look into LogMeIn Free. It allows you to access your computer desktop remotely. It is very easy to install and doesn’t require any special knowledge.

[divider_top]