This Week's Top 5 Blogs - 2.20.13
Academic Leadership: 3 C’s to Ensure Success in the Classroom
Most people share their challenges, yet few give as much attention to their success. Of course, we can grow and learn from challenges, but there is just as much growth and learning available when we examine our success.
Tweeting Jurors and Judges: Can Fair Trials Exist with Social Media?
In previous blogs, we looked at how criminals are using social media and what they’re doing with the information they find online. We also discussed how law enforcement uses social media to track and ultimately prosecute criminals. Now let’s look at how social media is impacting the courtroom.
6 Internal Security Threats Your Company May Have Overlooked
For data to truly be an asset, there must be processes, procedures, systems and ownership that insure the accuracy, integrity and timeliness of the data. If data does not have these attributes and capabilities, then why should we be concerned with protecting it? This reveals an obvious front-end requirement of the spectrum of data protection.
Hot Career Alert: Demand for Cybersecurity Experts on the Rise
Virtually all government and business databases and operations are digitized. Most are linked through communications networks, with many accessible via the Internet. Since information, from national security secrets to trade secrets and daily business operations, is housed in computers and their networks, it’s not surprising that cyberattacks are a major threat to the cyberworld. Within cyberspace, attacks motivated by criminals, hostile governments, terrorists, ex-employees with grudges and hackers have become an epidemic problem.
True Grit: Does it Help You Become More Successful?
Recently, I came across the idea of “true grit,” or the ability to persevere through the greatest of odds and succeed. This resonated with me because of its relation to my thesis topic on resiliency and cultural expectations where I assessed how cultural upbringing affected resiliency in children
Stay in the know! Subscribe to CTU’s blog and receive fresh updates directly to your inbox. Join us!
Terms and Conditions
By providing your mobile number, you agree to receive text messages from Colorado Tech via its mobile text message provider. You may opt out of receiving messages by texting the word STOP to 94576, or simply reply with the word STOP to any text message you receive from Colorado Tech.
While CEC or its mobile text message provider will not charge end users for receiving/responding to promotional messages, depending on the terms of your mobile phone plan, you may incur a cost from your mobile service carrier to receive and respond to any promotional text messages (standard messaging and data rates/fees and other charges may apply). Charges will appear on your mobile phone bill or will be deducted from pre-paid amounts. Current participating/supported carriers are: Alltel, AT&T, Boost, Cellcom, Cellular One, Cellular South, Cincinnati Bell, Cricket, Element Wireless, Golden State Cellular, iWireless, Metro PCS, Nextel, nTelos, Plateau Wireless, Sprint, T-Mobile, US Cellular, Verizon Wireless, Viaero Wireless, Virgin, and more.×