It’s been a great year here at SmartFile with plenty of big events happening. We also are excited to see our blog posts and content get noticed and shared on tech sites across the world. If you haven’t had the chance to see our recent news, follow along below to catch up!
Hiring Don Scifres
We are pleased to have Don Scifres join SmartFile in the newly created position of President. Don is the co-founder and managing partner of VisionTech Partners | VisionTech Angels and will take over the operations, product development, services and finance divisions for SmartFile. See the Don Scifres coverage:
Inside Indiana Business
SmartFile Adds President
Indiana Business Journal (IBJ)
Scifres Joins Local Software Company as President
John Hurley Interview and Articles
In Las Vegas at Interop 2016, CEO John Hurley was interviewed by Network World on the Shadow IT problem that businesses are facing today.
Additionally, John had two articles published by leading online media outlets, both on the different ways Shadow IT can manifest itself and will have an interview published in the July issue of No Jitter.
Network World (Video)
How to Work with Rogue Users
CIOL
Clinton Email Fiasco: Did you look at the footnotes?
IT Pro Portal
Corporate Employees: Your Worst IT Risk
Shadow IT
We like to write about important things that affect the tech and security industries — especially issues we think our clients need to be aware of. Our piece on Shadow IT and its infographic were picked up by CIO/Network World and shared in the IEEE newsletter.
CIO (Gated)
Shadow IT 101: Beyond Convenience vs. Security
IT Business Net
Businesses: You Can’t Keep Ignoring Shadow IT
Social Engineering
Social engineering is kind of a big deal these days. Instead of the classic hacking where a nefarious techie sits down and infiltrates a business’s network, a social engineer manipulates an employee into giving away credentials or access; it’s also known as “hacking a human.” This piece and infographic got some nice coverage from Lifehacker and CSO.
Lifehacker
How Social Engineering Attacks Happen, and How You Can Avoid Them
CSO
Social Engineering 101: 18 Ways to Hack a Human