Kim Lindros

Kim Lindros is a full-time content, online curricula and classroom training developer with a focus on security, Windows, and business topics. She has also contributed to several books on Windows technologies, applications and IT certification.

8 awesome (and sometimes free) conference call services

8 awesome (and sometimes free) conference call services

Conference call services want your business — even those that offer free plans — and their feature sets are getting better all the time.

What is cyber insurance and why you need it

What is cyber insurance and why you need it

Cyber insurance can't protect your organization from cybercrime, but it can keep your business on stable financial footing should a significant security event occur.

5 tips for defending against advanced persistent threats

5 tips for defending against advanced persistent threats

APTs are increasing in occurrence and severity, as are the costs associated with protecting businesses adequately from. Is your organization prepared to do battle against an APT? You better be.

How to use Microsoft Power BI for dashboards and more

How to use Microsoft Power BI for dashboards and more

Power BI brings intuitive data analysis to both the executive level as well as Microsoft Office power users who have a penchant for number crunching, data slicing and dicing, and reporting.

How to control Cortana, Windows Hello and other Windows 10 features

How to control Cortana, Windows Hello and other Windows 10 features

Many features of Windows 10 and specific apps are highly configurable in the enterprise, whether an administrator wants to turn them on, tweak settings or turn them off entirely.

Is it time to move from Windows 7, 8 and 8.1 to Windows 10?

Is it time to move from Windows 7, 8 and 8.1 to Windows 10?

Although Windows 7 is still the dominant desktop operating system (at around 50 percent of all desktop installations as of November 2015), it's time for you to determine whether to stick with Windows 7 (or 8/8.1) or deploy Windows 10....

How to perform a clean install of Windows 10

How to perform a clean install of Windows 10

At some point in the life of your PC, you’re probably going to need to reinstall the operating system. Find out when a reset or clean install of Windows 10 is needed, and pick up tips for to ensure a smooth transition.

Top 7 storage certifications for IT pros

Demand for capable and talented storage technicians and engineers remains high in today's workplace, so what better way to showcase your skills than with a well-respected certification in that field? Check out our top picks from...

Your guide to compliance in the cloud

Your guide to compliance in the cloud

You can ensure cloud compliance with PCI DSS, HIPAA and other regulatory requirements, but it takes investigation and persistence to get the answers and documentation you need to prove it.

How to Choose the Best Vulnerability Scanning Tool for Your Business

How to Choose the Best Vulnerability Scanning Tool for Your Business

Any shop with Internet access must scan its network and systems regularly for vulnerabilities, but old-fangled tools made this a painful and time-consuming effort. Find out how new and improved vulnerability scanners make life easier...

How to Explain the Cloud to End Users

How to Explain the Cloud to End Users

'Nobody understands the cloud,' says a lead character in the summer comedy 'Sex Tape.' The cloud and cloud computing have become an essential part of IT infrastructures -- but could your employees use a Cloud 101 primer? Put another...

14 Mobile Certifications That Meet IT Demands

Mobile technologies are increasingly important to organizations of all sizes, but how can you best prepare your workforce? Find out which of these 14 vendor-specific and vendor-neutral mobile IT certifications -- from app development...

5 Ways to Prevent Data Loss in Mobile Environments

Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data...

How to Test the Security Savvy of Your Staff

How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up...

Virtual Desktop Infrastructure Offers Risks and Rewards

After years of false starts, virtual desktop infrastructure (VDI) products are here. They work, and if implemented correctly they can deliver substantial cost savings to enterprise IT shops. What are the risks and rewards involved in...

Load More