In this post I will make predictions about the future. It’s part of an ongoing series of articles relating to my predictions of the future as I see it. Genetic engineering is the process of changing genetics (even modifying DNA) for the purpose of changing the properties of a living organism. Genetic Engineering In the […]
Looking back at the evolution of cyber attacks, it’s clear that the nature of cyber attacks are changing and getting more sophisticated. I am confident that cyber attacks will continue to increase, continue to grow more sophisticated, and continue to exploit new ways to profit from cyber crime. Here are my predictions for some of […]
Shrinkage, loss, theft – the reality is whatever you call it, shrinkage is a problem for many businesses and it doesn’t go away by itself. You could be losing thousands of dollars to shrinkage without even knowing it. And if you don’t do something about it, the problem will likely get worse!
This book is filled with proven, practical strategies that reduce shrinkage and boost your bottom line. Starting with an inside out approach, the strategies in this book will help you protect your business, products, and inventory and reduce and prevent the shrinkage that costs businesses millions of dollars every year.
Using the strategies in this book, you will be able to easily create a layered approach to prevent shrinkage that works like the layers of a bullet-proof vest to protect your business. Get employees, technology, policies, and human nature all working for you to cut shrinkage and protect your business.
This is the first book I published.
Available from: Amazon.com
Published: March 2013
What is phishing? Phishing is when someone tries to trick you into divulging sensitive information like passwords, bank accounts, etc. Phishing attacks are often conducted via email where the email is made to appear as though it’s coming from someone you trust. Examples of phishing One example of phishing would be if a scammer sends […]
Don’t let everyday life get in the way of every day love!
– Weston Henry
Copyright (C) 2017 Weston Henry
Lately there has been a growing concern of botnets fueled by an increasing number of botnet-related articles in the news. The concern is valid as all signs point to botnets growing in number, size, and sophistication. The botnet threat isn’t likely to go away anytime soon and it’s probably going to get worse before it […]
Throughout the course of some very busy weeks recently, I’ve found myself trying to remember if I locked my car or not. Typically this happens to me when I’m at an event or in a meeting and I find myself stressing over whether or not my car is locked. It’s gotten to the point where […]
Yahoo! recently disclosed that it discovered a data breach that occurred back in 2013. Yahoo! said the breach likely resulted in the theft of more than 1 billion data records. Yahoo! says those records contained names, email addresses, and passwords but not financial information. In September of 2016, Yahoo! disclosed that it had been breached by […]
The SECRET to execution is easy.
It’s the COMMITMENT to execution that’s hard.
– Weston Henry
Security is the number two priority for small business IT. Why is security the second most important thing for small business IT? Because without proper security, your network and your data are at risk. And the scariest thing about not having good security is that you might not even know that your network and data […]