Follow us at
Sapient Coach
  • Blog
  • Services
  • Contact
  • Español

Factors That Influence the Cybersecurity Behavior: A Cross-Cultural Study

1/17/2021

0 Comments

 
Picture
Gilberto Crespo-Pérez invites you to be part of his dissertation as a requirement to the degree of Doctor of Business Administration (DBA) in Management Information Systems. Participants must be over 21 years of age who are information systems/security managers and practitioners, among them, Chief Information Security Officers (CISOs), the Chief Technology Officers (CTO), the Chief Risk Officer (CRO), Enterprise Security Architects (ESA) and the Chief Technology Officers (CTO), among other C-Level security managers.

This investigation consists of 52 questions that can be completed in a time no more than 15 minutes. These results will be analyzed for the purpose of completing my doctoral thesis. If you have any question, please contact me at the following email:
gcrespo27@email.uagm.edu.

Thank you in advance for your collaboration in this research. I would greatly appreciate if you share this invitation to other colleagues.

Begin Survey
0 Comments

Investing in IT Staff to Reduce Security Breaches and Data Leaks

5/5/2019

0 Comments

 
SapientCoach, Gilberto Crespo Technology Blogger
​It is well known that humans are the weakest link in the information security chain, but specifically, who are them? Well, you may guess, “they” are everyone. I have been in both sides, as a user and as a system admin; and in both sceneries humans tend to make mistakes. It’s human nature.

Read More
0 Comments

A Prescription for an Information Security Risk Management Program

4/21/2018

0 Comments

 
Cybersecurity Sapient Coach
A lot have been investigated, written and said about how to better protect companies against the unstoppable proliferation of advanced and sophisticated cyber-threats/attacks. By default, and by common sense, we tend to think that by adopting and implementing cutting-edge security technologies, companies will be on a better position to stop, prevent, and reduce security threats from cyber-criminals. This is not so far from reality. Lots of technologies have emerged and being adopted to reach that goal. Among these technologies are: Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Firewalls, Antivirus, Network Access Control (NAC), Proxies, Gateways, Advance Threat Analytics (ATA), Sandboxes, Multi-factor Authentication (MFA), Artificial Intelligence (AI), and Machine Learning (ML) solutions to mention a few.  However, security and data breaches still happen and are on the news all around the world, every day.

Read More
0 Comments

Blended Learning: An Alternative for Undergraduate Anatomy Teaching in Developing Countries

3/16/2018

0 Comments

 
Anatomy, the study of tissues, organs and systems in the body, is an essential component in the curricula of many health professions. Due to curricular design, complexity of the learning material, and time devoted to teaching, anatomy learning could be compromised. Anatomy instructors and educational institutions must look for ways to complement anatomy teaching in order to better prepare students for what they will find at both, the graduate level and the work environment. In this review, we compared multiple approaches for anatomy teaching, and blended learning appears to give better results for contents comprehension, retention, and academic development. 

Read More
0 Comments

Convergence Of Cloud Computing, Internet Of Things, And Machine Learning: The Future Of Decision Support Systems

7/16/2017

0 Comments

 
Machine Learning, Cloud Computing & Internet of Things Sapient CoachDesigned by Freepik
The objective of this research was to develop a framework for understanding the Convergence of Cloud Computing, Machine Learning, and Internet of Things as the future of Decision Support Systems. To develop this framework, the researchers analyzed and synthesized 35 research articles from 2006 to 2017. The results indicated that when the data is massive, it is necessary to use computational algorithms and complex analytical techniques. The Internet of Things, in combination with the large accumulation of data and data mining, improves the learning of automatic intelligence for business. This is due to the fact that the technology has the intelligence to infer and provide solutions based on past experiences and past events. 


Read More
0 Comments

Cyberwarfare: Artificial Intelligence in the Frontlines of Combat

7/11/2017

0 Comments

 
Picture
In the last decade of the proliferation of the World Wide Web, there has been a shift from normal human combat warfare to electronic warfare, where a person with a computer can do more damage to the infrastructure of a country than thousands of soldiers. The amount of data, intelligence, and damage generated by such warfare is astronomical. This type of warfare requires artificial intelligence and Expert Systems to go to the forefront of the battlefield in order to analyze data and trends to identify potential attacks and provide countermeasures to such attack. AI has put in a new perspective how Decision Support Systems (DSS) improve defense. DSS implemented today are in place to stop and deter in the shortest possible amount of time a cyberattack, and assist cyber defenders in finding the correct response.


Read More
0 Comments

First Line of Defense Against WanaCry Ransomware

5/15/2017

0 Comments

 
SapientCoach WannaCry Ransomware Decryptor
​WannaCry or Wanna Decrytor ransomware is an informatic virus that attacks Windows operating system based computers primarily (including servers) by taking advantage of system vulnerabilities exploited by Eternalblue, a tool believed to be developed by the USA National Security Agency. What is the unique effect once infected by the virus? Well, you will notice it fast. The system will show you a Popup window letting you know that your computer is infected, all your files are encrypted, and for you to recover it all, they require a ransom payment using bitcoins. Unless you make the payment, all your files will stay encrypted. The worst thing about this virus is that, if you do not pay in a certain period, the ransom payment will keep rising.
But, wait! The intention of this article is not to create panic. Even though you should panic if your computer got infected and you didn't backed up your files recently (last day or night before the infection). 

Read More
0 Comments

Careful with your Online Posting

2/5/2017

1 Comment

 
Sapient Coach Online Posting - Social Platforms
​Today more than ever, we are living in the interconnected and social era. Generation X and the famous Millennials, are so connected to the Internet, and spend so much time sharing almost everything about themselves, that they don’t imagine their life could go any other way.  This is without online presence, in their social communities and networks, 24 hours a day, 7 days a week, 365 days a year.

Read More
1 Comment

Professional Certifications or a College Degree: Which one is Better for Your Career?

9/11/2016

0 Comments

 
Sapient Coach Professional Career
Some time ago, I had the opportunity to write an article titled “To be a certified professional or not to be”. It was about why some companies place more weight on certification’s credentials, than on years of experience and college degrees. I briefly explained that it was because some certifications are a must-have, since they “prove” that you are “following” the best practices, industry standards, and keep yourself up-to-date with new technologies and methodologies. This is true, but there are some other credentials that are just as nice to have, just to say that you have it (merely decorative). As the saying goes: “The suit does not make the clergyman, but distinguishes him”


Read More
0 Comments

To be a certified professional or not to be

7/3/2016

1 Comment

 
SapientCoach Professional Certification
​One of the things most professionals and independent consultants hate when they are seeking for new opportunities and businesses is when they are asked for professional certifications on jobs interviews and business meetings. It feels frustrating, especially when you have ten, fifteen or twenty years of experience in different industries, work environments and a BS, MS, or even a PhD in the field where you’re applying or prospecting.

Read More
1 Comment
<<Previous
    Gilberto Crespo

    Author

    Gilberto Crespo is an information technology expert, specialized life & executive coach, writer and blogger.

    He has been working for more than 18 years in the information technology industries and in executive & life coaching.  He is also a motivational and leadership speaker.

    View my profile on LinkedIn

    Archives

    May 2019
    April 2018
    March 2018
    July 2017
    May 2017
    February 2017
    September 2016
    July 2016
    April 2016
    March 2016
    January 2016
    December 2015
    November 2015
    August 2015
    June 2015
    May 2015
    February 2015
    January 2015

    Categories

    All
    Android
    Apple
    Business
    Certification
    CloudComputing
    Coaching
    Computers
    Cyber
    Cybersecurity
    Education
    Employment
    Faith
    Goals
    Google
    Hackers
    Heaven
    Homeopathy
    Inspiration
    IOS
    IoT
    Jobs
    Microsoft
    Motivation
    Nature
    Online
    Potions
    Publication
    Remedies
    Research
    Security
    Skies
    Sun
    Technology
    Tips
    Work
    Zombies

    Subscribe to email updates, it's FREE

    *required

Copyright © 2020.  This site is part of Sapient Coach © 2020.  All rights reserved.  All content posted on this site is a commentary or an opinion, and is protected by freedom of expression.  Sapient Coach is not responsible for content written by contributing authors.  The information in this blog is provided for educational and informational purposes only.  It is not intended as a substitute for professional advice of any kind.  Sapient Coach © assumes no responsibility for the use or misuse of this material.  The use of this web site indicates your acceptance of these terms.  All brands, trademarks and service marks mentioned on this site are the property of their respective owners.

Designed by Blig Consulting

BligConsulting.com