Kim Lindros

Kim Lindros is a full-time content, online curricula and classroom training developer with a focus on security, Windows, and business topics. She has also contributed to several books on Windows technologies, applications and IT certification.

What is IT governance? A formal way to align IT & business strategy

How to create an effective business continuity plan

How to create an effective business continuity plan

A business continuity plan outlines procedures and instructions an organization must follow in the face of disaster, whether fire, flood or cyberattack. Here's how to create one that gives your business the best chance of surviving...

What is GRC and why do you need it?

What is GRC and why do you need it?

GRC is a strategy for managing an organization's overall governance, enterprise risk management and compliance with regulations Learn how GRC can help you align IT activities to business goals, manage risk effectively and stay on top...

external url

The top 6 Governance, Risk and Compliance certifications

CEOs are always on the lookout for dependable folks who can identify potential exposures and quantify the impacts of risk on an organization while protecting the interests of employees, shareholders, other organizations and the...

What is cyber insurance and why you need it

What is cyber insurance and why you need it

Cyber insurance can't protect your organization from cybercrime, but it can keep your business on stable financial footing should a significant security event occur.

external url

Top 7 storage certifications for IT pros

Demand for capable and talented storage technicians and engineers remains high in today's workplace, so what better way to showcase your skills than with a well-respected certification in that field? Check out our top picks from...

Top 7 storage certifications for IT pros

Demand for capable and talented storage technicians and engineers remains high in today's workplace, so what better way to showcase your skills than with a well-respected certification in that field? Check out our top picks from...

Your guide to compliance in the cloud

Your guide to compliance in the cloud

You can ensure cloud compliance with PCI DSS, HIPAA and other regulatory requirements, but it takes investigation and persistence to get the answers and documentation you need to prove it.

How to choose the best vulnerability scanning tool for your business

Any shop with Internet access must scan its network and systems regularly for vulnerabilities, but old-fangled tools made this a painful and time-consuming effort. Find out how new and improved vulnerability scanners make life easier...

How to Choose the Best Vulnerability Scanning Tool for Your Business

How to Choose the Best Vulnerability Scanning Tool for Your Business

Any shop with Internet access must scan its network and systems regularly for vulnerabilities, but old-fangled tools made this a painful and time-consuming effort. Find out how new and improved vulnerability scanners make life easier...

How to explain the cloud to end users

Popular culture has exposed a fundamental knowledge gap in the ordinary consumer. Even though our smartphones are set up to auto-save pics to our online accounts, we enjoy hours of streaming videos and music, and we regularly use...

How to Explain the Cloud to End Users

How to Explain the Cloud to End Users

'Nobody understands the cloud,' says a lead character in the summer comedy 'Sex Tape.' The cloud and cloud computing have become an essential part of IT infrastructures -- but could your employees use a Cloud 101 primer? Put another...

Load More