Sometimes you gotta lighten the mood. (And give a little information)

Ok, we get it.  All of this is not exactly relevant to recruiting.  But we work hard and we play hard, and that means taking some time to laugh!  

For us that means occasionally taking a minute or three for some comedic relief to help us keep our sanity during long days when the IT guy tells you to “just take it offline so we can patch it”. 

These are a few of our favorites.


  • Clues You Have Been Hacked August 10, 2020
    Some of the most common indicators that you may have been include the following. Your friends tell you that they have received odd emails or messages from you, messages you know you did not send. Your password no longer works for one of your accounts, even though you know you never changed the password. Your […]
  • Digital Inheritance August 7, 2020
    What happens to our digital presence when we die or become incapacitated? Many of us have or know we should have a will and checklists of what loved ones need to know in the event of our passing. But what about all of our digital data and online accounts? Consider creating some type of digital […]
  • Two-Step Verification August 6, 2020
    Two-step verification (also called two-factor authentication or 2FA) is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. At a minimum enable two-step verifcation for your most important accounts such as emai, financial […]
  • Patch and Update August 5, 2020
    One of the most effective ways you can protect your computers and devices at home is to make sure both the operating system and your applications are patched and updated. Enable automatic updating whenever possible.
  • What is Malware August 4, 2020
    Malware is software--a computer program--used to perform malicious actions. In fact, the term malware is a combination of the words malicious and software. Cyber criminals install malware on your computers or devices to gain control over them or gain access to what they contain. Once installed, these attackers can use malware to spy on your […]
Recruiting and OT Cybersecurity Fun April 23, 2016