Blog Posts about Security
While, in general, I’d prefer to interview face-to-face, the phone screen interview does have its place during the initial selection process. Here is how to use the phone screen interview process to your advantage as the candidate.
You don’t normally have to go looking for recruiters. They usually find you. Just place your resume at some of the most popular job boards and it’s “open season” on recruiters seeking you out to fill their contract jobs. When you are unemployed, that can certainly be a good thing. I’ve found, however, that not all recruiters are created equally. Some are not worth your time and are just not a good match to help you.
When I lost my job at the end of November, I knew that it couldn’t have come at a worse time. There were those that told me that there would be few opportunities through the end of the year, and as hard as I worked to try to prove them wrong, they weren’t.
I’m not talking about working as an IT guy in healthcare versus working in IT in the finance industry. I’m talking about have you ever considered getting out of IT and doing something completely different?
DEactivating your facebook account only disables it. Traenk now wants to go the extra step.
Traenk wants to DELETE his account and all its data? Why would he want to do that? What kind of special processing does that take? Read on, and see what issues await you if you decide to do the same.
Traenk reviews some background to security problems in financial systems.
I'm sorry, Traenk; I cannot allow you to do that.
Many people are entranced by vulnerabilities but fail to see the ultimate vulnerability.
Online banking, shopping from your armchair, and computer-initiated loans are leaving people more vulnerable to theft. Traenk discloses a new series in this blog.
You can find more information on obsolete mayan calendars than you can find evidence of people practicing the most basic business resumption planning, Traenk finds.