Don't worry, I get it. Reading an actual physical book is so ten years ago. Today with the technology there could even be an app for VR where a mystical elf reads you the book while you rest on a stump. But there is something about them that really helps us understand the original vision of the authors, and there are great pieces for IT Management to learn from.
This is why we have compiled our list of the ten books an IT Manager should read, in no particular order, because rankings are for very organized people and popular YouTube channels.
Remember when chat rooms were huge in the early 00s? Slack takes this concept and turns it into a very useful tool for teams, which can be improved upon using the numerous Apps and integration options available to this highly customizable experience.
IT Professionals can truly take advantage of this tool, which they’re probably already using, by adding the ones that fit their and their organization’s needs. We’ve compiled a list of five options that are bound to be useful if used properly.
Being an IT Professional has its ups and downs, and one of the main perks of being one is that you must always be informed of how your own area of work is growing and evolving. This is something that progresses along with you, and there is so much room to be explored, and because of this it is almost mandatory for a good IT Manager to be up to date on the latest trends.
Are you ready to pay a ransom for your own personal data? You better have your digital weapons prepared, because cyber attacks of this kind against mobile device security are rapidly growing. The
2016 Internet Security Threat Report, developed by Symantec, stands that ransomware has increased 35% in the last year, and now it isn’t only attacking PCs but also smartphones, Mac and Linux systems.
Nearly 97% of U.S. college students have a cellphone, and 79% own a laptop. That’s a lot, right? Problem is that both devices are a very attractive loot for campus thieves - 4.5 million smartphones were lost or stolen in the United States in 2013 - and who’s responsible for computer security in educational institutions? Yeah, you, the IT avenger.
Releasing Control Zones some time ago was a big deal for us and our users. Finally, a geofencing feature for Prey was seeing the light: it was now possible for our users to create zones in the map in their Prey account and get notified each time a device left or entered an area. All fine and dandy, for iOS and Android.
Laptop thefts on campus are one big headache for IT guys. But what if your university has multiple campuses in town? A bigger headache!
In the United States, the Department of Education says this headache is "the most common crime on college campuses," according to Consumer Reports.
Choose the right answer: BYOD is...
a) An excellent idea. Why I didn’t come up with that? I could get a bonus.
b) Crap. Did a meteorite hit your head?
c) What the hell is BYOD?
Since the “bring your own device” (BYOD) policy started to be widely implemented in educational institutions in the United States, lovers and haters of this solution have been raising their voices to determine if this really means a deep improvement for education and campus safety.
Let’s take a look at the most common pros and cons about it. Let the fight begins!