Kim Lindros

Kim Lindros is a full-time content, online curricula and classroom training developer with a focus on security, Windows, and business topics. She has also contributed to several books on Windows technologies, applications and IT certification.

10 questions to ask IDaaS vendors before you buy

 12 hardware and software vulnerabilities you should address now

12 hardware and software vulnerabilities you should address now

Hardware and software that live past their end-of-life dates pose serious risks to organizations. Find out which assets you should update, upgrade or replace ASAP.

How (and why) to customize the Windows 10 Start menu

How (and why) to customize the Windows 10 Start menu

The Windows 10 Start menu is a blend of navigation from Windows Phone and Windows 7, and it's highly customizable. We’ll walk you through it.

Tips for adding IPv6 to IPv4 networks

Tips for adding IPv6 to IPv4 networks

The IPv6 transition in your organization, more likely than not, involves bringing IPv6 into a mix that also includes IPv4. Here’s a look at what that means and how to make it work.

5 tips for defending against advanced persistent threats

5 tips for defending against advanced persistent threats

Is your organization prepared to do battle against an APT? You'd better be.

Is it time to move from Windows 7, 8 and 8.1 to Windows 10?

Is it time to move from Windows 7, 8 and 8.1 to Windows 10?

Although Windows 7 is still the dominant desktop operating system (at around 50 percent of all desktop installations as of November 2015), it's time for you to determine whether to stick with Windows 7 (or 8/8.1) or deploy Windows 10....

How to perform a clean install of Windows 10

How to perform a clean install of Windows 10

At some point in the life of you PC, you’re probably going to need to reinstall the operating system. Find out when a reset or clean install of Windows 10 is needed, and pick up tips for to ensure a smooth transition.

Your guide to compliance in the cloud

Your guide to compliance in the cloud

You can ensure cloud compliance with PCI DSS, HIPAA and other regulatory requirements, but it takes investigation and persistence to get the answers and documentation you need to prove it.

How to choose the best vulnerability scanning tool for your business

Any shop with Internet access must scan its network and systems regularly for vulnerabilities, but old-fangled tools made this a painful and time-consuming effort. Find out how new and improved vulnerability scanners make life easier...

How to explain the cloud to end users

Popular culture has exposed a fundamental knowledge gap in the ordinary consumer. Even though our smartphones are set up to auto-save pics to our online accounts, we enjoy hours of streaming videos and music, and we regularly use...

14 mobile certifications that meet IT demands

Mobile technologies are increasingly important to organizations of all sizes, but how can you best prepare your workforce? Find out which of these 14 vendor-specific and vendor-neutral mobile IT certifications -- from app development...

Tip

5 ways to prevent data loss in mobile environments

Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data...

Load More