Kim Lindros

Kim Lindros is a full-time content, online curricula and classroom training developer with a focus on security, Windows, and business topics. She has also contributed to several books on Windows technologies, applications and IT certification.

What is IT governance? A formal way to align IT & business strategy

How to create an effective business continuity plan

How to create an effective business continuity plan

A business continuity plan outlines procedures and instructions an organization must follow in the face of disaster, whether fire, flood or cyberattack. Here's how to create one that gives your business the best chance of surviving...

What is GRC and why do you need it?

What is GRC and why do you need it?

GRC is a strategy for managing an organization's overall governance, enterprise risk management and compliance with regulations Learn how GRC can help you align IT activities to business goals, manage risk effectively and stay on top...

The top 6 Governance, Risk and Compliance certifications

CEOs are always on the lookout for dependable folks who can identify potential exposures and quantify the impacts of risk on an organization while protecting the interests of employees, shareholders, other organizations and the...

The top 6 governance, risk and compliance (GRC) certifications

The top 6 governance, risk and compliance (GRC) certifications

Job roles from IT auditor to security engineer to CIO require or benefit from a GRC certification. Here are six top-rated governance, risk and compliance certifications that are worth the time, cost and effort.

10 must-ask questions for evaluating EDR tools

10 must-ask questions for evaluating EDR tools

Are you thinking about investing in an endpoint detection and response solution? These pre-purchase questions will help you find the tool that meets your needs.

10 questions to ask IDaaS vendors before you buy

10 questions to ask IDaaS vendors before you buy

Of the Everests that IT faces daily, identity and access management is a particular challenge. These 10 questions help you find a solution that delivers what you need.

 12 hardware and software vulnerabilities you should address now

12 hardware and software vulnerabilities you should address now

Hardware and software that live past their end-of-life dates pose serious risks to organizations. Find out which assets you should update, upgrade or replace ASAP.

How to get started with a private Windows Store for Business

How to get started with a private Windows Store for Business

Windows Store for Business lets admins find suitable apps for their organization, acquire them in bulk and distribute them through their own private ‘storefront.’ This offers much-needed control, but its greatest benefit might be that...

What your cyber risk profile tells insurers

What your cyber risk profile tells insurers

The purpose of a cyber risk profile is to assess your organization's insurability. The work you do upfront can go a long way toward ensuring you get adequate cyber insurance coverage and a better rate to boot.

How (and why) to customize the Windows 10 Start menu

How (and why) to customize the Windows 10 Start menu

The Windows 10 Start menu is a blend of navigation from Windows Phone and Windows 7, and it's highly customizable. We’ll walk you through it.

Tips for adding IPv6 to IPv4 networks

Tips for adding IPv6 to IPv4 networks

The IPv6 transition in your organization, more likely than not, involves bringing IPv6 into a mix that also includes IPv4. Here’s a look at what that means and how to make it work.

Load More