Discover The CTU Experience

CTU Blog

Archives

Content Type

Content Category

 

Latest Posts

What Six Internal Security Threats are Lurking Down Your Office Corridors?

Big data is more than just hype from the tech world. The proliferation of information across multiple dimensions is real. It comes from everywhere, from cellphone GPS signals, to purchase records and to the updates we make to our favorite social media websites.

Striking a Balance: BYOD in the Corporation

I’m writing this post from the Next Generation Security Summit (NGSS) in Austin, TX. The event brings together about 100 senior executives, in particular the chief information security officers (CISOs), from corporations around the country. Are you curious to know the #1 priority on their minds? CISOs want to know how the proliferation of mobile devices impacts security and compliance. More specifically, how should organizations manage the Bring Your Own Device (BYOD) issue?

Is Cloud Computing Right For Your Organization?

Smart CIOs aren’t lemmings, leaping over cliffs and chasing bright shiny objects in search of the next Information Technology (IT) silver bullet. But in the case of cloud computing, many are diving in – head first.

Auto Hacking Could Be Your Biggest Threat

Approximately 400,000 people flow into the District of Columbia to work each day. Many commute by train or Metro. But a large number drive and thoughtlessly endure the slog into the Washington metro area. Few consider the potential threat hidden in their automobiles. But what if someone wanted to shut down the U.S. government? How might a determined adversary approach the problem using a non-kinetic weapon (i.e. no bombs or boom)? Could a simple computer virus do the trick?

When Disaster Strikes, Will Your Data be Safe?

Natural disasters, like Hurricane Sandy, are grim reminders that we are all vulnerable to unexpected catastrophes brought on by nature or by mankind. Weeks, months, and potentially years later, we experience devastating after-effects that disrupt our lives and our businesses. Yet, much can be done to mitigate the effects of disasters on your business, and it starts with a proactive disaster recovery (DR) strategy.

Copyright © 2016 Colorado Technical University (CTU). All rights reserved. No information may be duplicated without CTU's permission. The CTU logo is a registered trademark of Career Education Corporation. CTU cannot guarantee employment or salary. Not all programs are available to residents of all states. Programs vary by location and modality; see catalog for details. Financial aid is available for those who qualify. See the Accreditation & Licensure section for information on the agencies that approve and regulate the school's programs, including relevant complaint procedures here. Find employment rates, financial obligations and other disclosures below.

Privacy Statement Legal Terms and Conditions Student Disclosures Sitemap Student Safety Contact Us


 (855) 230-0555

Terms and Conditions By providing your mobile number, you agree to receive text messages from Colorado Tech via its mobile text message provider.  You may opt out of receiving messages by texting the word STOP to 94576, or simply reply with the word STOP to any text message you receive from Colorado Tech. While CEC or its mobile text message provider will not charge end users for receiving/responding to promotional messages, depending on the terms of your mobile phone plan, you may incur a cost from your mobile service carrier to receive and respond to any promotional text messages (standard messaging and data rates/fees and other charges may apply).  Charges will appear on your mobile phone bill or will be deducted from pre-paid amounts.  Current participating/supported carriers are: Alltel, AT&T, Boost, Cellcom, Cellular One, Cellular South, Cincinnati Bell, Cricket, Element Wireless, Golden State Cellular, iWireless, Metro PCS, Nextel, nTelos, Plateau Wireless, Sprint, T-Mobile, US Cellular, Verizon Wireless, Viaero Wireless, Virgin, and more.×