Rejection letters, what you shouldn’t say.

Everyone has applied for at least one job; most (especially these days) hundreds. For the vast majority, these attempts at find employment fail. But how can you tell? Two basic ways are silence and the proverbial rejection letter. But which is better? Silence: While you may have met the job specifications 110%, for some unknown […]

Read More »

Overtime, it ain’t over until the payment is made

A recent discussion on Proformative.com centered on Non-Exempt employees and Overtime. This area of Labor Law is extremely confusing; best clarified by both an expert HR Consultant and Labor Attorney; but I will give you a broad-stroke definition. Nonexempt employees are entitled to overtime pay. Exempt employees are not. Most employees covered by the Fair […]

Read More »

Intellectual Property – Is it an issue?

Intellectual Property (IP) is more than just patents, trademarks and service marks. It can encompass any copyrightable attribute aspect of your company as well as proprietary information that is developed. In recent years, the rate of IP theft and prosecution (either civil or criminal) has increased; and it’s not solely based on industrial espionage in […]

Read More »

Business Continuity; it’s more than just IT

When you mention Business Continuity to a businessperson, the usual response is that the IT staff handles that, because it’s all about computers. How far from the truth this is… This misconception can lead to a major business interruption. While IT Data Recovery is an important aspect of any Business Continuity Plan (BCP), how does […]

Read More »

Linux More Hackable? Bah, Humbug!

I wrote this article for Network Computing about a decade ago. I don’t think the premise or conclusions have changed much; but that in itself is a chilling and telling fact. Wayne Spivak April 22nd, 2013 Linux More Hackable? Bah, Humbug! Posted by Wayne Spivak November 19, 2004 In a recent article,Study: Linux ‘Most Breached’ […]

Read More »

The Misconception of the C-Level Suite

I went to a networking event and was talking to a very intelligent, articulate young woman. As in all these events, the questions were asked as to jobs, employment, and a short explanation of job duties. This young lady was a sourcing agent for a fashion house. Her function was to find the best manufacturing […]

Read More »

Hurricane Season is a little less than 3 months away — Do you have a Crisis Management and Business Continuity Plan

Tornado’s, flooding, earthquakes, hurricanes and other natural disasters; fire, threats, civil disturbance, accidents, structure failures, are always present and a fact of life. Survival of your home, family and business is always a paramount issue when events such as these occur. ‘But are you ready? Find a location on Earth that is immune for a […]

Read More »

Thinking, Reacting and Understanding the Consequences

In a recent blog post by Alan Berkson http://blog.intelligistgroup.com/the-new-fud-full-unwanted-disclosure/he describes what The New FUD: Full Unwanted Disclosure has morphed into and how it is effecting the business landscape. (FUD is Fear, uncertainty and doubt and full-wanted disclosure) His example is the recent wholesale firing of 50 (a total of 190) employees at HMV Group PLC […]

Read More »

Are you a Cyber Victim?

Cyber Spying is not used by nation-states alone anymore. As Lisbeth Salander, the character in The Girl with the Dragon Tattoo demonstrated, if there is information on a network somewhere, it can be gotten – and not just by those intended to get it! Today, cyber intrusion leading to crime is a real threat for […]

Read More »