Thought Leadership

Threats Posed by Ex-Employees

February 26, 2018

No company has 100% employee retention rate. Some may get close, but in today’s business landscape, employees come and go regularly. It’s become part of the natural cycle for companies and people’s careers. Parting doesn’t mean you’re on bad terms with this person, of course. People part ways for many reasons, but even if you do part with an employee on good terms, it’s important to have your offboarding procedures finely tuned. The fact of the matter is, these ex-employees can pose [...]

Supporting Operational Efficiency in Construction

February 23, 2018

There is more than one way to create efficiency in an organization, but many of these are supported and created by people. For a construction firm, both the labor and office employees can modify workflows, adopt technological advances and follow company procedures to create and maintain efficiencies. Huge efficiencies can be created through different technologies. At the design and estimating stages of a job, when working to get data back and forth from the field, and so on. If we get a little l [...]

Mobile Device Management and BYOD

February 14, 2018

Mobile Device Management software allows organizations to control and secure access of personal smartphones and tablets on a company’s network. What’s that mean – not just anyone can access your organization’s data on any device. Setting up a BYOD policy to work in conjunction with Mobile Device Management is the best way to ensure your data is safe. MDM When you have Mobile Device Management (MDM), you can allow mobile devices on the corporate infrastructure without any worries that t [...]

Chrome To Mark All HTTP Sites As “Not Secure”

February 13, 2018

Starting in July, news broke that Google has announced that Chrome will mark all HTTP sites as “not secure” Version 68 will notify users in the address bar. All HTTPS sites, which are encrypted, are currently marked with a green lock icon and “secure” sign. The main reason behind this change is to help users identify unencrypted and potentially threatening sites. When a site uses HTTPS encryption, the channel between a user’s browser and a user’s website is protected to ensure [...]

Edtech Security Lunch & Learn 2018

February 5, 2018

This past January, GadellNet was pleased to host a number of technology, operations, and academic leaders from schools that we know and work with for a round-table discussion about security principles that are of the most importance to schools.   Given the increasing rate of school-focused cyberattacks, schools must take steps to ... Educate their workforce and the children in their care Make policy decisions that begin to funnel the adoption of technologies through a vetting process [...]

Facing Insecurity: Addressing school cybersecurity concerns through the TLE Seal

February 2, 2018

Student data is increasingly valuable to criminals, some of whom have recently extorted thousands of dollars in ransom from US schools unwilling to see student and parent data released. Over the next couple weeks, I’ll be outlining six artifacts I hope to see in place for our schools, and their alignment to indicators of the Trusted Learning Environment Seal. For each artifact, I'll include a description of the challenges I see ahead of us and a few of the steps we’ll be taki [...]

6 Technologies to Help You Get Through 6 More Weeks of Winter

Punxsutawney Phil has spoken – we have six more weeks of winter ahead of us. There is no doubt that it takes a little more effort to go out in the winter. You need your gloves, hat, boots, maybe a scarf. You need to start your car early and shovel the drive. Sure, the winter wonderland is beautiful, but there are a few drawbacks as well, including the potholes we have to dodge from the freeze/thaw cycle. Thinking about another six weeks of this mess can have some of us a little bummed. Luck [...]