Not all hackers are bad: Different between White Hat and Black Hat Hacker and who is Gray Hat?

not all hackers are not all bad.

When we think of the word “Hacker” what do we associate with? I believe 90% of non-technical people will think of a hacker as someone that is up to no good and often do illegal stuff, like hacking our computer. 

Well, my mission here today is to save the hacker’s reputation (at least those good one). Because believe it or not, there are 2 types of hackers available in this world, one good and one bad. The bad one is what people generally think about when they come in contact with the word “hacker”. In the technical world, we call it Black Hat.

The good one, who we call White Hat, are those who do hacking for the good, and with permission. And there is another bonus one, that stuck in the middle of good and bad, we call it Gray Hat. Let me share with you one by one, what each of them does.

Continue reading “Not all hackers are bad: Different between White Hat and Black Hat Hacker and who is Gray Hat?”

Power User vs Top feature in Pivot Table – Part 3

Sorting and Filtering Pivot Report

Sort and filter button will automatically add into your Pivot Table once you start creating it. It is part of the feature in Pivot Table. The sorting feature confuses a lot of my student, many times. The first thing that confuses them what should they do first while sorting? I totally understand this. Simply because if you take a good look at the structure of the Pivot Table, as you add many more fields into the report, all you get it one Filter button for Row fields and another one for Column fields.

I will start real slow, so at the end of this section you have got to be confuse no more! I will be using the Pivot report as shown below as the example for this section.

Continue reading “Power User vs Top feature in Pivot Table – Part 3”

Continuous oversight in the cloud

Cloud computing services are increasingly mediating the connections. In this environment, information assurance professionals must not only address longstanding information security threats and vulnerabilities, but they also face new challenges relative to their experience in the field just a few years—or even months—before.

This white paper advocates for continuous oversight of the wide variety of cloud services used by organizations—a set of distinct, but related, management and assurance practices that address critical emerging risk domains, including security, privacy and compliance.

Continuous oversight includes:

  • Continuous assurance for data and processes
  • Continuous cloud assurance
  • Continuous supply chain management and oversight
  • Continuous improvement (CI)

A Crash Course in Office 365

You and your team are likely some of the 1.2 billion people worldwide who have used Office 365. You’re familiar with standard apps like Word, Excel, Outlook, and PowerPoint. But when it comes to your business’s ever-changing needs and challenges, there’s more to Office 365 than meets the eye. From business intelligence programs to communication and teamwork solutions, advances in these productivity tools are changing the way we live and work. And whether your team’s concerns revolve around topics like security, mobile device management, or working remotely, a shift to the cloud can do more for your growing business than ever before.

In this e-book, you’ll learn how to make the best use of specific Office 365 apps across six critical areas of your business:

  • Mobility
  • Teamwork
  • Communication
  • Security
  • Productivity
  • Insights