

Kim Lindros
Kim Lindros is a full-time content, online curricula and classroom training developer with a focus on security, Windows, and business topics. She has also contributed to several books on Windows technologies, applications and IT certification.


Your guide to compliance in the cloud
You can ensure cloud compliance with PCI DSS, HIPAA and other regulatory requirements, but it takes investigation and persistence to get the answers and documentation you need to prove it.

How to Choose the Best Vulnerability Scanning Tool for Your Business
Any shop with Internet access must scan its network and systems regularly for vulnerabilities, but old-fangled tools made this a painful and time-consuming effort. Find out how new and improved vulnerability scanners make life easier...

How to Explain the Cloud to End Users
'Nobody understands the cloud,' says a lead character in the summer comedy 'Sex Tape.' The cloud and cloud computing have become an essential part of IT infrastructures -- but could your employees use a Cloud 101 primer?
14 Mobile Certifications That Meet IT Demands
Mobile technologies are increasingly important to organizations of all sizes, but how can you best prepare your workforce? Find out which of these 14 vendor-specific and vendor-neutral mobile IT certifications -- from app development...
5 Ways to Prevent Data Loss in Mobile Environments
Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing...
How to Test the Security Savvy of Your Staff
How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test...
Virtual Desktop Infrastructure Offers Risks and Rewards
After years of false starts, virtual desktop infrastructure (VDI) products are here. They work, and if implemented correctly they can deliver substantial cost savings to enterprise IT shops. What are the risks and rewards involved in...
How to Create an Effective Business Continuity Plan
Natural and manmade disasters underscore the challenges of seamless disaster recovery in the real world. Having a comprehensive business continuity plan isn't just an IT concern; though. Nothing less than the survival of your...