You’re in a hurry and need to get an email sent, but you have one concern…you need to include some sensitive information.
If you have email encryption enabled, it’s not a problem.
You add the encryption code word to the subject line or in the body of the email and hit send.
Step 2 to Enhancing Your IT Security – Email Encryption
Organizing Your Virtual Jenga Tower
Have you ever seen anyone play the game of Jenga? It starts with a tower of wooden bricks, sometimes 16 layers high. Each player takes a turn at removing a brick and then places it back on the top of the pile. The tower starts off very stable but ends up very wobbly and eventually collapses in the end.
Checkmate! What’s Your Next IT Security Move?
How does your IT Security relate to a game of chess?
For those of you who have played the game of chess, you know that each piece has its specific role and rules of engagement. For example, the bishop can only move diagonally across the board and so on.
Cathy’s Corner – February 2018
From the desk of: Cathy Coloff
Growing up as a kid, I don’t really remember playing many board games until I reached high school with the exception of Backgammon. We had a travel version of it that I would play with my family and friends on our sailing trips in the waters of North Carolina.
February 2018 IT Radix Resource Newsletter
The Game of Life
In this issue:
- Checkmate! What’s Your Next IT Security Move?
- Organizing Your Virtual Jenga Tower
- Step 2 to Enhancing Your IT Security
- Can You Build a Better Mousetrap?