Kim Lindros

Kim Lindros is a full-time content, online curricula and classroom training developer with a focus on security, Windows, and business topics. She has also contributed to several books on Windows technologies, applications and IT certification.

10 questions to ask IDaaS vendors before you buy

 12 hardware and software vulnerabilities you should address now

12 hardware and software vulnerabilities you should address now

Hardware and software that live past their end-of-life dates pose serious risks to organizations. Find out which assets you should update, upgrade or replace ASAP.

How (and why) to customize the Windows 10 Start menu

How (and why) to customize the Windows 10 Start menu

The Windows 10 Start menu is a blend of navigation from Windows Phone and Windows 7, and it's highly customizable. We’ll walk you through it.

Tips for adding IPv6 to IPv4 networks

Tips for adding IPv6 to IPv4 networks

The IPv6 transition in your organization, more likely than not, involves bringing IPv6 into a mix that also includes IPv4. Here’s a look at what that means and how to make it work.

5 tips for defending against advanced persistent threats

5 tips for defending against advanced persistent threats

Is your organization prepared to do battle against an APT? You'd better be.

Is it time to move from Windows 7, 8 and 8.1 to Windows 10?

Is it time to move from Windows 7, 8 and 8.1 to Windows 10?

Although Windows 7 is still the dominant desktop operating system (at around 50 percent of all desktop installations as of November 2015), it's time for you to determine whether to stick with Windows 7 (or 8/8.1) or deploy Windows 10....

How to perform a clean install of Windows 10

How to perform a clean install of Windows 10

At some point in the life of you PC, you’re probably going to need to reinstall the operating system. Find out when a reset or clean install of Windows 10 is needed, and pick up tips for to ensure a smooth transition.

5 Ways to Prevent Data Loss in Mobile Environments

Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data...

How to Test the Security Savvy of Your Staff

How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up...

Virtual Desktop Infrastructure Offers Risks and Rewards

After years of false starts, virtual desktop infrastructure (VDI) products are here. They work, and if implemented correctly they can deliver substantial cost savings to enterprise IT shops. What are the risks and rewards involved in...

How to Create an Effective Business Continuity Plan

Natural and manmade disasters underscore the challenges of seamless disaster recovery in the real world. Having a comprehensive business continuity plan isn't just an IT concern; though. Nothing less than the survival of your company...

Load More