Blog of Tips, Tricks & Resources from New Horizons Central

Penetration Testing vs. Vulnerability Assessment

Penetration testing, ethical hacking, or pen-testing as it is often called, is a much more active approach to identifying and even attempting to exploit vulnerabilities in a particular system, while a Vulnerability Assessment is an exercise in checking the security state of a system at a particular point in time or under a specific configuration. 

Nicole Winn 0 1

 

Penetration testing, ethical hacking, or pen-testing as it is often called, is a much more active approach to identifying and even attempting to exploit vulnerabilities in a particular system, while a Vulnerability Assessment is an exercise in checking the security state of a system at a particular point in time or under a specific configuration.  While the main goal of a Pen Test is to produce a report of exploited vulnerabilities and to show evidence of the breaches, a Vulnerability Assessment is employed in order to identify risks and threats associated with identified vulnerabilities and to recommend the most efficient and cost-effective controls required to best mitigate those vulnerabilities.

Wasting Hours of Your Life Pulling Data for Reports?

Your search is over! Expert Eric Satterfield to the rescue with POWER BI

Nicole Winn 0 48

 

If you, like so many others, have been searching for an easier way, a faster way, a better way to work with your data, then read on to discover just three of the reasons why I think you need Power BI, Microsoft’s next-generation data analysis tool, and believe your search is at an end.

When VLookup doesn’t cut: Try Index/Match

The Index Function is a function that finds a value in a dataset, but it doesn’t care about Unique Identifiers.

Nicole Winn 0 11

 

If you know the row, it’s a go. If you know the Column, no problem. The Match Function finds Rows and Finds Columns. So, when their powers combine…we find values. Remember the VLookup is a function within Excel that finds a value in a Dataset by looking at a Unique Identifier and then finding the appropriate value in adjacent columns to the right.

In a FLASH!

Watch Excel magic happen with the Flash Fill Data Separation Tool

Nicole Winn 0 8

 

Flash Fill is a data separation tool that has been packaged with every version of Excel since 2013!  However, it is often overlooked and underutilized.

Password exploitation is a constant threat to a business' bottom line, so how are you prioritizing IT security positions to get ahead of it?

Password Exploitation: 83% of Americans Are at Risk

Nicole Winn 0 77

 

This blog outlines tips to protect your data and how cybersecurity training with New Horizons can help fill the skills gap when it comes to IT security.

CLD Corner: Developing a Better Online Presence

Virtual Remote Environments: Tips, Tricks & Signals

Nicole Winn 0 54

 

With the recent transitions in shifting to a more virtual work environment, it is imperative to show that you have as strong of an online presence as you do a face-to-face presence. All too often, we run into issues with our “home office setup,” and we need to better understand what signals we are providing the people we are conversing with. 

Becoming Mickey Mouse

Achieve extraordinary customer service and leverage your capabilities.

Nicole Winn 0 50

 

For most businesses, customer service is the difference between success and failure in the marketplace.  With that in mind, Jim Lifter has put together some thoughts that will help you achieve extraordinary customer service and leverage your capabilities.

Don’t Let Your Organization’s Data Get Taken Hostage by Ransomware

Network Security and Ransomware: Learn How To Protect Against Ransomware

Nicole Winn 0 151

 

Ransomware is big business for cybercriminals. It is estimated ransomware costs will reach $20 billion by 2021! The best way to prevent a ransomware attack is through a comprehensive network security program. In this blog, learn how businesses are investing in skilled IT security workers to protect personal and organizational data.

CLD Corner: The Four Levels of Conversation

CLD Corner with Dr. Jason Pugh

Nicole Winn 0 97

 

With a Ph.D. in Instructional Management and Leadership from Robert Morris University, Dr. Jason Pugh re-joined the New Horizons team with over 12 years of teaching, training, and educational development experience. 

Jason has a wealth of knowledge with conducting synchronous and asynchronous trainings and developing course materials for both live and online training sessions. He has been a training manager and an instructional coach for the last 3 ½ years, developing teachers and trainers to be successful in their endeavors. 

RSS

Theme picker

Loader