Ransomware makes California nursing school feel ill

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World IT Best Practices Alert

Jan 30, 2017

As Baby Boomers retire, the shortage of mainframe professionals grows more acute  

People who started their careers when the mainframe was king are retiring in droves, yet this computing platform is still vital to many businesses Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Ransomware makes California nursing school feel ill
Wi-Fi as a service is after the IT department
Cisco’s AppDynamics purchase: A big price tag that could have big dividends
(From our archives) Researchers make low-power Wi-Fi breakthrough
Nasuni CEO: ‘We’re going to liberate you from the bottleneck around your files’
Face-off: Oracle vs. CA for identity management
(From our archives) Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial
Four lesser-known Wi-Fi security threats and how to defend against them
What to ask IDaaS vendors before you buy

Video/Webcast: Neustar Inc

2016: A Security Minefield - Will You Be Ready for 2017?

Ransomware. Politically-motivated hacking. Distributed denial-of-service - and now mega-DDoS attacks targeting the foundations of the Internet, thanks to vulnerabilities in the burgeoning Internet of Things. 2016 has been a landmark year for information security in many ways. What can we expect in 2017? Read More

Thumbnail Image

Ransomware makes California nursing school feel ill

About three months ago, an instructor at Gurnick Academy, a California-based nursing school, had his biggest fear come alive. When he tried to access his lectures, the files were encrypted. The teacher was literally locked out of his classroom. Read More

Thumbnail Image

Wi-Fi as a service is after the IT department

Wi-Fi is so critical to businesses that companies will outsource it to companies like KodaCloud if necessary so that they have experts managing it. Read More

Thumbnail Image

Cisco’s AppDynamics purchase: A big price tag that could have big dividends

Cisco must have seen something interesting in AppDynamics and its application performance solutions to offer $3.7 billion for it. Read More

Thumbnail Image

(From our archives) Researchers make low-power Wi-Fi breakthrough

The biggest downside of Wi-Fi for most users might be that it can really drain your smartphone or tablet battery, but a research team at the University of Washington has come up with a way to make using the nearly ubiquitous wireless technology in a less taxing way. Read More

Thumbnail Image
INSIDER

Nasuni CEO: ‘We’re going to liberate you from the bottleneck around your files’

In this installment of the IDG CEO Interview Series, Rodriguez spoke with Chief Content Officer John Gallant about how the Nasuni UniFS file system works, how customers deploy it and what kind of savings and flexibility they can expect. Read More

Thumbnail Image
INSIDER

Face-off: Oracle vs. CA for identity management

Considering identity and access management (IAM) software? Download this free report for side-by-side comparisons of rival products from Oracle and CA, based on reviews written by enterprise users of the products. Read More

(From our archives) Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial

Read More

Thumbnail Image

Four lesser-known Wi-Fi security threats and how to defend against them

You’ve hardened your network against all the common weaknesses, now we’ll show you how to take your wireless security to the next level. Read More

Thumbnail Image
INSIDER

What to ask IDaaS vendors before you buy

Of the Everests that IT faces daily, identity and access management is a particular challenge. These 10 questions help you find a solution that delivers what you need. Read More

White Paper: Neustar Inc

Cybersecurity Essentials for 2017

For cybersecurity professionals, 2016 presented a year of distributed denial of service (DDoS) attacks that were unprecedented. Week after week, the public was inundated with news of hacks, attacks, and data leaks. It didn't take long for everybody to realize the old axiom of cybersecurity still holds true - there are two types of companies: those who are hacked and know about it, and those who are hacked and soon will find out. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

9 painful ways people hurt themselves with computers/video games

10 amazing Raspberry Pi clusters Read More

Most-Read Stories

1. Game over for Solaris and SPARC?
2. Raspberry Pi roundup: Here comes Google (kinda, probably), Competitor corner and the sounds of Pilience
3. Has Cisco broken out of the network hardware box
4. As Baby Boomers retire, the shortage of mainframe professionals grows more acute
5. LinkedIn pumps water down to its server racks, uses an interesting spine and leaf network fabric
6. My worst tech purchase ever
7. 19 free cloud storage options
8. 7 free tools every network needs
9. Apple iOS 10.3 beta 1 packs a wallop; iOS 11 rumors heat up
10. Guy who swore off smartphones tries to use a smartphone
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World IT Best Practices Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.