Ransomware Attacks: 20 Essential Considerations For Prep And Response

Establishing risk management processes is often overlooked. Having a workflow everyone—including members of the C-suite—is trained on helps limit the complexities of ransomware attacks. When you’re attacked, it’s all about time, limitation and response. Too often, the process takes too long, with not enough limits and either an overreaction or underreaction to the situation. This allows ransomware attacks to be far more successful.

~ Tom Roberto

 

See the full article here, on Forbes.

20 Questions To Help Tech Pros Pinpoint Clients’ Real Needs

Many people have no idea how tech might, or might not, be able to solve their problem. Clients would be wise to explain their issue and how they currently work through the problem. Then, someone in tech can marry their issue with a solution and either remedy the issue completely or offer up something better than what the client is doing today.

~ Tom Roberto

 

See the full article here, on Forbes.

Considering A Tech Career? 14 Future-Forward Specialties To Explore

If I were a student with a tech career in my sights, I would focus on sales empowerment (via CRM systems) or data processing (any kind of data science). Nothing will be more important for businesses in the upcoming decade as the need to integrate Salesforce into everything. Along with that will come the need for data aggregation, processing, storage and manipulation. Everything else may be more sexy—but it comes totally second to sales and metrics.

~ Tom Roberto

 

See the full article here, on Forbes.

Tech Pros: Boost Your Skills With These 14 Resources

YouTube is one of my greatest resources. It is truly the wealth of human knowledge, in full-motion videos that are searchable and easily consumed. Nothing compares to real people sharing wisdom and opinions for all to see and comment on. It’s what we should rely on as the default means of record-keeping. Nothing else compares.

~ Tom Roberto

 

See the full article here, on Forbes.

11 Ways To Address Security From The Start Of Your Tech Project

When looking at a product, you should always be designing for set functionality, like an appliance. When the environment is static, it’s far easier to have strong security. Open-ended functionality, open architecture or long lists of variables end up crippling security protocols and create a breeding ground for hacks and potential security breaches. It’s not bad to be locked down and static.

~ Tom Roberto

 

See the full article here, on Forbes.

Should Everyone Learn To Code? 15 Tech Pros Weigh In On Why Or Why Not.

Learning to code is like learning a language. It’s necessary in some situations, and handy from time to time. Learning logic is more like learning to communicate. It’s not the same as coding. Far too many technologists fail to understand how computers and code work, which is far more fundamental than the language itself. Understanding logic is not coding, but not addressed by far too many folks.

~ Tom Roberto

 

See the full article here, on Forbes.