SlideShare a Scribd company logo
Keeping 'em Safe:
8 More Ways
to Help Your
Clients
More than 8 in 10 US small businesses believe
   their firms are safe from cyber threats yet
almost 80% have no formal security policies in
                      place.

You can be attacked and not even know it. Even
   worse, your system could be used to attack
     other people, and you may not know it.
What Is Cyber Crime?
●
    Spam
●
    Fraud
●
    Obscene or offensive content
●
    Harassment
●
    Child pornography
●
    Drug trafficking
●
    Cyber terrorism
●
    Cyber warfare
Who Is Behind
          Cyber Crime?
●
    Script kiddies
●
    Hacktivists
●
    Individual miscreants
●
    National & transnational organized criminal
    enterprises
●
    Nation states
Why Should You Care?
●
    Your clients trust you with very sensitive data.
●
    If they become victims, your clients have less of
    an ability to bounce back.
●
    Systems that are used to commit crimes often
    support the same organized networks that are
    behind human trafficking, identity theft, child
    pornography, and other issues you battle against
    daily.
Biggest Threat?

       You
What? No Way!
●
  Acting maliciously
●
  Forgetting to log off
●
  Losing laptops, USB keys, or smartphones
●
  Storing client data in questionable places
●
  Downloading viruses and malware
●
  Using social network sites carelessly
●
  Leaving metadata in documents
●
  Having bad password practices
●
  Getting tricked
Acting maliciously
What You Can Do
●
    Put policies in place and enforce them
●
    Trust your gut
Forgetting
 to log off
What You Can Do
●
    Log off when you leave your computer
●
    Shut down your computer at the end of the
    day
●
    Set up your computer to automatically lock
    when the screensaver comes on
Losing laptops,
USB keys, or
smartphones
What You Can Do
●
    Pay special attention and be careful
●
    Store only the client data you absolutely need
●
    Encrypt your data
●
    Set up phones so you can erase them remotely
●
    Use strong passwords
●
    Back up the data before you leave
Storing client data in
questionable places
What You Can Do
●
    Read privacy policies
●
    Develop a set of approved sites that client
    information can be stored on and train staff to
    not store data on any other sites
●
    Don't include identifiable client information in
    emails
Downloading
viruses and
malware
What You Can Do
●
    Patch software and systems religiously
●
    Read before you click
●
    Ask if the email or attachment seems “funny”
●
    Avoid downloading screensavers, fonts, & porn
●
    Use your anti-virus software
●
    Ignore any website that pops up a virus warning
Using social
network
sites
carelessly
What You Can Do
●
    Be careful what you click
●
    Don't friend people you don't know
●
    Use strong passwords
●
    Avoid playing games and installing applications
●
    Be very careful about what you post
Leaving
metadata in
 documents
What You Can Do
●
    Clean metadata from documents before sending
    electronic copies
●
    Use the Document Inspector tool in Office
●
    Download and use Metadata Removal tool for
    WordPerfect
Having bad
password
practices
What You Can Do
●
    Use strong passwords
●
    Change passwords quarterly
●
    Don't use a password for more than one site
●
    Don't share passwords
●
    Establish password guidelines for the
    organization and follow them
●
    Try a password manager
Getting tricked
What You Can Do
●
    Be skeptical
●
    Don't give anyone your passwords
●
    Don't click a link to your bank website
What If?
●
    Tell your supervisor immediately
●
    Be prepared to help figure out what happened
●
    Notify the proper authorities
Who Are the
         Proper Authorities?
Computer Intrusion           Local FBI Office
                             US Secret Service
                             Internet Crime Complaint Center

Password trafficking         Local FBI Office
                             US Secret Service
                             Internet Crime Complaint Center

Counterfeiting of currency   US Secret Service
Who Are the
          Proper Authorities?
Child pornography or   Local FBI Office
exploitation           US Customs and Enforcement (if imported)
                       Internet Crime Complaint Center

Internet fraud & SPAM Local FBI Office
                      US Secret Service (Financial Crimes Division)
                      Federal Trade Commission
                      Securities & Exchange Commission (if securities/investment-related)
                      Internet Crime Complaint Center

Internet harassment    Local FBI Office
Resources
●
    Cybercrime Reporting
    http://www.cybercrime.gov/reporting.htm
●
    Stay Safe Online
    http://www.staysafeonline.org/
●
    US CERT
    http://www.us-cert.gov/nav/nt01/
Resources
●
    US CERT
    http://www.us-cert.gov/cas/tips/
●
    OnGuard Online
    http://www.onguardonline.gov/topics/computer-security.aspx
Picture Attributions
In order
http://www.flickr.com/photos/jesseshapins/3788641411/
http://commons.wikimedia.org/wiki/File:Harry_Potter_Lightning.gif
http://commons.wikimedia.org/wiki/File:Computer_n_screen.svg
http://www.flickr.com/photos/dunechaser/385847284/sizes/l/
http://www.flickr.com/photos/sravi_in/3623242288/sizes/z/
http://www.flickr.com/photos/stukjefotogebeuren/2081170312/
http://www.flickr.com/photos/librarianbyday/3983719036/
http://www.flickr.com/photos/booleansplit/4650422195/
http://www.flickr.com/photos/the-icing-on-the-cake/2424326595/
http://www.flickr.com/photos/sshb/3619977273/
http://www.flickr.com/photos/esm723/4377802647/
http://www.flickr.com/photos/stevendepolo/4027405671/
Contact Information



Kate Bladow
Founder & Strategist
presentations@poweredpursuits.com

More Related Content

What's hot

RATs
RATsRATs
Internet Security
Internet SecurityInternet Security
Internet Security
mjelson
 
Computer security and malware by shahzad younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younas
Shahzad Younas
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 
Zero Day Response: Strategies for Cyber Security Defense
Zero Day Response: Strategies for Cyber Security DefenseZero Day Response: Strategies for Cyber Security Defense
Zero Day Response: Strategies for Cyber Security Defense
Tripwire
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
Mohammed Adam
 
Government Data Breach
Government Data BreachGovernment Data Breach
Government Data Breach
News Feather
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
Daniel Agudo Garcia
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
DallasHaselhorst
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Rohit Trimukhe
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
phexcom1
 
Internet security
Internet securityInternet security
Internet security
Mohammed Adam
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpointTy122987
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
Jesse Ratcliffe, OSCP
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
NetLockSmith
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
Blake Carver
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
Adam Nurudini
 

What's hot (18)

RATs
RATsRATs
RATs
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer security and malware by shahzad younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younas
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Zero Day Response: Strategies for Cyber Security Defense
Zero Day Response: Strategies for Cyber Security DefenseZero Day Response: Strategies for Cyber Security Defense
Zero Day Response: Strategies for Cyber Security Defense
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Source Intelligence
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
Government Data Breach
Government Data BreachGovernment Data Breach
Government Data Breach
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
 
Internet security
Internet securityInternet security
Internet security
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 

Viewers also liked

Recalls, Recovery, and (Credit) Reports, Oh My!
Recalls, Recovery, and (Credit) Reports, Oh My!Recalls, Recovery, and (Credit) Reports, Oh My!
Recalls, Recovery, and (Credit) Reports, Oh My!vogus
 
Idesco 2013
Idesco 2013Idesco 2013
Idesco 2013
Idesco Oy
 
Online Training Options for Disaster Education
Online Training Options for Disaster EducationOnline Training Options for Disaster Education
Online Training Options for Disaster Education
bkoch
 
Identity crisis
Identity crisisIdentity crisis
Identity crisisnnguyen10
 
Using Social Media for the Public Good
Using Social Media for the Public GoodUsing Social Media for the Public Good
Using Social Media for the Public Good
Kate Bladow
 
Small Business Owners – Don’t Get Caught With Out Data Security.
Small Business Owners – Don’t Get Caught With Out Data Security.Small Business Owners – Don’t Get Caught With Out Data Security.
Small Business Owners – Don’t Get Caught With Out Data Security.
Tonya R. Taylor
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
ecarrow
 

Viewers also liked (7)

Recalls, Recovery, and (Credit) Reports, Oh My!
Recalls, Recovery, and (Credit) Reports, Oh My!Recalls, Recovery, and (Credit) Reports, Oh My!
Recalls, Recovery, and (Credit) Reports, Oh My!
 
Idesco 2013
Idesco 2013Idesco 2013
Idesco 2013
 
Online Training Options for Disaster Education
Online Training Options for Disaster EducationOnline Training Options for Disaster Education
Online Training Options for Disaster Education
 
Identity crisis
Identity crisisIdentity crisis
Identity crisis
 
Using Social Media for the Public Good
Using Social Media for the Public GoodUsing Social Media for the Public Good
Using Social Media for the Public Good
 
Small Business Owners – Don’t Get Caught With Out Data Security.
Small Business Owners – Don’t Get Caught With Out Data Security.Small Business Owners – Don’t Get Caught With Out Data Security.
Small Business Owners – Don’t Get Caught With Out Data Security.
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
 

Similar to Keeping 'Em Safe: Ways to Protect Your Clients Online

Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
Abzetdin Adamov
 
The Human Side of Security
The Human Side of SecurityThe Human Side of Security
The Human Side of Security
Randy Earl
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Computer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account informationComputer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account information
Church of the Epiphany
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
Ujjwal Acharya
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
DjTechs
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
Ronald Soh
 
Log Out Cyber Awareness
Log Out Cyber AwarenessLog Out Cyber Awareness
Log Out Cyber Awareness
Apurv Singh Gautam
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
 
Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)
Kit O'Connell
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)Vinayak Hegde
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
Barry Caplin
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
Michele Chubirka
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
Jesus Rances
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
Geoffrey Vaughan
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
- Mark - Fullbright
 
IESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John BambenekIESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John Bambenek
John Bambenek
 

Similar to Keeping 'Em Safe: Ways to Protect Your Clients Online (20)

Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
The Human Side of Security
The Human Side of SecurityThe Human Side of Security
The Human Side of Security
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Computer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account informationComputer Security Seminar: Protect your internet account information
Computer Security Seminar: Protect your internet account information
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Log Out Cyber Awareness
Log Out Cyber AwarenessLog Out Cyber Awareness
Log Out Cyber Awareness
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
IESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John BambenekIESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John Bambenek
 

More from Kate Bladow

10 Things I've Learned About Linux
10 Things I've Learned About Linux10 Things I've Learned About Linux
10 Things I've Learned About Linux
Kate Bladow
 
Homelessness, Youth, & Technology
Homelessness, Youth, & TechnologyHomelessness, Youth, & Technology
Homelessness, Youth, & Technology
Kate Bladow
 
Social Media for Busy Professionals
Social Media for Busy ProfessionalsSocial Media for Busy Professionals
Social Media for Busy Professionals
Kate Bladow
 
Twitter, Events, & Network Graphs
Twitter, Events, & Network GraphsTwitter, Events, & Network Graphs
Twitter, Events, & Network Graphs
Kate Bladow
 
New Media and Social Benefit
New Media and Social BenefitNew Media and Social Benefit
New Media and Social Benefit
Kate Bladow
 
A Thousand Points of Like: Raising Money Through Social Media Channels
A Thousand Points of Like: Raising Money Through Social Media ChannelsA Thousand Points of Like: Raising Money Through Social Media Channels
A Thousand Points of Like: Raising Money Through Social Media Channels
Kate Bladow
 
So, I Created a Profile, Now What? (Social Media 101 for Fundraisers)
So, I Created a Profile, Now What? (Social Media 101 for Fundraisers)So, I Created a Profile, Now What? (Social Media 101 for Fundraisers)
So, I Created a Profile, Now What? (Social Media 101 for Fundraisers)
Kate Bladow
 
Tech Resources for Artist Seminar
Tech Resources for Artist SeminarTech Resources for Artist Seminar
Tech Resources for Artist Seminar
Kate Bladow
 
Using Current Technology
Using Current TechnologyUsing Current Technology
Using Current Technology
Kate Bladow
 
Nonprofits and Social Media
Nonprofits and Social MediaNonprofits and Social Media
Nonprofits and Social Media
Kate Bladow
 
Technology Tips for Legal Aid Advocates
Technology Tips for Legal Aid AdvocatesTechnology Tips for Legal Aid Advocates
Technology Tips for Legal Aid Advocates
Kate Bladow
 
Plain Language & Writing for the Web
Plain Language & Writing for the WebPlain Language & Writing for the Web
Plain Language & Writing for the Web
Kate Bladow
 
Social Media for Busy Professionals
Social Media for Busy ProfessionalsSocial Media for Busy Professionals
Social Media for Busy Professionals
Kate Bladow
 
Where Do I Start? Social Media for Beginners - Bladow, Crawford
Where Do I Start? Social Media for Beginners - Bladow, CrawfordWhere Do I Start? Social Media for Beginners - Bladow, Crawford
Where Do I Start? Social Media for Beginners - Bladow, Crawford
Kate Bladow
 

More from Kate Bladow (14)

10 Things I've Learned About Linux
10 Things I've Learned About Linux10 Things I've Learned About Linux
10 Things I've Learned About Linux
 
Homelessness, Youth, & Technology
Homelessness, Youth, & TechnologyHomelessness, Youth, & Technology
Homelessness, Youth, & Technology
 
Social Media for Busy Professionals
Social Media for Busy ProfessionalsSocial Media for Busy Professionals
Social Media for Busy Professionals
 
Twitter, Events, & Network Graphs
Twitter, Events, & Network GraphsTwitter, Events, & Network Graphs
Twitter, Events, & Network Graphs
 
New Media and Social Benefit
New Media and Social BenefitNew Media and Social Benefit
New Media and Social Benefit
 
A Thousand Points of Like: Raising Money Through Social Media Channels
A Thousand Points of Like: Raising Money Through Social Media ChannelsA Thousand Points of Like: Raising Money Through Social Media Channels
A Thousand Points of Like: Raising Money Through Social Media Channels
 
So, I Created a Profile, Now What? (Social Media 101 for Fundraisers)
So, I Created a Profile, Now What? (Social Media 101 for Fundraisers)So, I Created a Profile, Now What? (Social Media 101 for Fundraisers)
So, I Created a Profile, Now What? (Social Media 101 for Fundraisers)
 
Tech Resources for Artist Seminar
Tech Resources for Artist SeminarTech Resources for Artist Seminar
Tech Resources for Artist Seminar
 
Using Current Technology
Using Current TechnologyUsing Current Technology
Using Current Technology
 
Nonprofits and Social Media
Nonprofits and Social MediaNonprofits and Social Media
Nonprofits and Social Media
 
Technology Tips for Legal Aid Advocates
Technology Tips for Legal Aid AdvocatesTechnology Tips for Legal Aid Advocates
Technology Tips for Legal Aid Advocates
 
Plain Language & Writing for the Web
Plain Language & Writing for the WebPlain Language & Writing for the Web
Plain Language & Writing for the Web
 
Social Media for Busy Professionals
Social Media for Busy ProfessionalsSocial Media for Busy Professionals
Social Media for Busy Professionals
 
Where Do I Start? Social Media for Beginners - Bladow, Crawford
Where Do I Start? Social Media for Beginners - Bladow, CrawfordWhere Do I Start? Social Media for Beginners - Bladow, Crawford
Where Do I Start? Social Media for Beginners - Bladow, Crawford
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Keeping 'Em Safe: Ways to Protect Your Clients Online