IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
June 23rd, 2016 | Jay Ferron | My information Resource
Would you like to learn about the latest and greatest features that Microsoft has built into PowerShell Version 5? Be sure to check out this course, and get the details that can enable you to begin using these features immediately. Explore the new features in PowerShell, including changes in - Read More
 
June 16th, 2016 | Jay Ferron | My information Resource
Corey Hynes and Ward Ralston teach this course about the features and functionality that have been added to this new version of Windows Server, along with those that were modified from previous versions. See demonstrations and get high-level overviews, from a practical and a conceptual standpoint. - Read More
 
June 10th, 2016 | Jay Ferron | My information Resource
Another MVA class  Dive into Windows 10 with award-winning journalist and Windows Expert Ed Bott, along with Microsoft Technical Evangelist Jennelle Crothers, in this course covering tips, shortcuts, and top utilities for Windows 10. Every IT Pro knows from firsthand experience that the - Read More
 
June 10th, 2016 | Jay Ferron | My information Resource
Part of the “Microsoft Azure Essentials” series, this ebook helps SQL Server database users understand Microsoft’s offering for SQL Server in Azure. Learn how SQL Server in Azure is similar to SQL Server in an on-premises environment, and how they are different. The author, a - Read More
 
June 2nd, 2016 | Jay Ferron | My information Resource
The Internet Crime Complaint Center (IC3) continues to receive reports from individuals who have received extortion attempts via e-mail related to recent high-profile data thefts. The recipients are told that personal information, such as their name, phone number, address, credit card information, - Read More
 
May 31st, 2016 | Jay Ferron | My information Resource
Call For Speakers – OPENYou are invited to the Capital of the World, New York City for the 3rd Annual Joint Cyber Security Conference on October 5th 2016.  The event will be feature internationally recognized  presentations delivered by security researchers, industry - Read More
 
May 28th, 2016 | Jay Ferron | My information Resource
Windows 10 IT Pro Essentials: Top 10 Tools Dive in to Windows 10 with award-winning journalist and Windows Expert Ed Bott in this highly curated free eBook covering the top apps, accessories, and utilities includ...ed in the box with Windows 10.The sheer volume of Windows programs and - Read More
 
April 16th, 2016 | Jay Ferron | My information Resource
FBI officials are warning potential victims of a dramatic rise in the business e-mail compromise scam or “B.E.C.,” a scheme that targets businesses and has resulted in massive financial losses in Phoenix and other cities. The schemers go to great lengths to spoof company e-mail or - Read More
 
April 16th, 2016 | Jay Ferron | My information Resource
As previously reported by the media in and after July 2015, security researchers evaluating automotive cybersecurity were able to demonstrate remote exploits of motor vehicles. The analysis demonstrated the researchers could gain significant control over vehicle functions remotely by exploiting - Read More
 
April 16th, 2016 | Jay Ferron | My information Resource
Each year, criminal actors target US persons and visa holders for Stolen Identity Refund Fraud (SIRF). SIRF is defined as the fraudulent acquisition and use of the Personally Identifiable Information (PII) of US persons or visa holders to file tax returns. The fraudulent tax returns are sent to - Read More
 

Pages