• Blog

    IT Staffing, Recruiting & Hiring News

The 10 Tech Books Bill Gates Says You Should be Reading


Bill Gates is a big fan of reading, often tearing through several dozen books each and every year. Recently, he has been especially focused on books about technology. Here is a look at the ten tech books Bill Gates thinks everyone should read in 2019.



IT professionals are often trusted with a significant amount of power in any organization. They have access to critical systems and data, some of which is not directly related to their positions.


Employees in any department may participate in some questionable activities, and IT workers are no exception. While some occasional lighthearted actions can be beneficial to morale, when certain lines are crossed, a serious problem exists.


To help you identify these issues and address unruly IT employee behavior, here are some common areas of concern and how to handle them.


Practical Jokes

IT employees are uniquely positioned when it comes to practical jokes. They can do anything from changing a person’s password to adjusting computer wallpaper, often remotely.


While some of these actions may seem harmless, they can easily become bothersome. For example, another employee’s work may be disrupted by a practical joke, hurting productivity. In more severe scenarios, such as changing a worker’s desktop background to something inappropriate, a staff member may become offended, or worse.


To prevent these activities, you need strong policies in place that define how credentials can be used as well as any consequences that are associated with these breaches of trust. Using alerts that inform the manager when specific actions are taken can also be effective deterrents, as all activities are automatically broadcast to their supervisor.



Accessing Confidential Information

Most IT professionals have administrator credentials that allow them to access a range of systems. While this is necessary for the work, it can cause problems when they abuse the privilege, using their credentials to access confidential or sensitive information not related to their positions.


Further, they often have the ability to delete or alter logs, giving them a chance to cover their tracks.


Setting up alerts can help spot this kind of activity, as well as a robust ticketing system that can help determine which actions are legitimate and which may be illicit in nature.


Non-Work-Related Activities

Since IT often controls what can be accessed over the internet and which activities are logged, the potential for abuse is significant. A worker could give themselves the ability to access entertainment related sites that would otherwise be blocked, giving them the opportunity to slack off while they are on the clock.


While taking a moment to relax isn’t inherently a problem, if they begin spending more than a reasonable amount of time on non-work-related activities, productivity is going to decline. Further, if they access inappropriate content using company resources, you could have a bigger problem.


To help lower the risk associated with such actions, it’s imperative that all employees be subject to the same restrictions based on actionable policies and that any attempts to circumvent certain blocks be appropriately logged and alerted. This helps deter IT professionals from taking advantage of their position, lessening the likelihood that someone will do so.


Ultimately, most IT employees are standup workers and wouldn’t abuse their power. However, it is crucial that the proper policies and monitoring mechanisms are in place to ensure that such activities don’t take place.


If you are interested in learning more or are looking to hire a new IT worker, the team at The Armada Group can help. Contact us today to see how our services can work for you.



Published in IT Infrastructure

3 Daily Habits That Will Make You a Better Leader

You've probably offered your staff suggestions to help them improve at work. But are you taking the time to improve your own leadership abilities? Do these three things on a daily basis to become a better leader and help your team work more effectively.

1. Express your expectations clearly.

You probably didn't assess your staff's mind-reading skills when you hired them, so it's unfair to expect them to read your mind on the job. Instead, work on expressing your expectations clearly, both verbally and in written documents. By being precise, you'll eliminate the need for your staff to guess what you want them to do, and reduce the number of times when they inevitably guess wrong. By clarifying expectations, you also increase accountability for other members of the team, which makes handling problems that arise easier.

2. Spend time with your team.

It isn't possible to lead once in a while; you need to lead your team every day. This means that, no matter how many demands your managers are placing on you, you need to spend time with your team on a frequent basis. You need to be involved to critique and give direction in the moment, as issues arise; fail to do that, and you'll have the unpleasant task of giving surprise negative feedback months later at an annual review. Spending time with your team also lets you get to know them better and understand the best way to leverage their talents to the benefit of the business.

3. Focus on others, not yourself.

Leadership is about drawing the best out of other people. This means letting go of your concerns about yourself. It also means encouraging action, not standing in the way, so work on creating an environment that encourages innovation and creative thinking rather than discouraging them. Apply this focus to serving the needs of others at external organizations, too. Volunteer with a community service or social organization that's meaningful to you. You'll learn how to lead people who don't have to follow; bring those more subtle leadership tactics back to the office where they'll help you become more effective at leading your direct reports.

Published in Hiring Managers

Staying Relevant

The moment you graduated from college, your skills were well on their way to becoming obsolete.  Sounds depressing, but that's a fact of life for an IT professional. Technology changes daily, seemingly at the speed of light. It's up to you to keep up if you want to remain relevant and marketable in your field. Here are a few tips that may help:

Be a people person

The IT field is rife will professionals who are highly knowledgeable, but unable to communicate what they know to people who don't speak IT. Increasingly, employers are adding communication skills and other soft skills to their list of “must haves”. Become a more well-rounded candidate, and you'll have your pick of opportunities.

Make keeping up a priority

Between your career and your outside obligations, remaining relevant in the IT field can seem like just one more thing to fit into an already overbooked day. But taking some time to focus on your professional development is essential to your career. Schedule some time into each week to keep up on industry news and advancements.

Keep on learning

Commit to continuing education as part of your career strategy. Work towards new certifications each year, learn new programming languages and technologies, or return to school to obtain advanced degrees. Your employer will likely encourage this initiative and offer reimbursement or allow you to expense at least part of the cost. If not, consider it an investment in your own future.

Stay connected

Stay in touch with others in your field.  Join groups, either online or by networking in person. Attend conferences and speeches by industry leaders so that you are always abreast of new developments. It's easy to work in a vacuum, but by making that regular commitment to engage, you increase your knowledge and marketability.

In a field where staying cutting-edge is essential to the industry and your career, it's important to make the time to improve your interpersonal and technical skills, that way you will always be ready for the next big opportunity that comes your way.        

Published in Staffing News

Microsoft Invests

At Microsoft's recent Ignite conference for IT professionals, Microsoft executives unveiled new security measures and services, and called out competitor Google for lax security practices.

“Google takes no responsibility to update their customers’ devices, leaving end-users and businesses increasingly exposed every day they use their Android devices,” said Terry Myerson, Microsoft’s executive vice president of operating systems. “Google just ships a big pile of code, and then leaves you exposed with no commitments.”

Microsoft is refining how it distributes security updates, starting with the upcoming releases of Windows 10 and Office 2016, Myerson said.

Changes to Update Protocols

Currently, Microsoft sends updates for Windows on the second Tuesday of each month on "Patch Tuesday." Many consumer machines are configured to download and apply the patches automatically, but enterprises may prefer to control the update process with Microsoft’s System Center Configuration Manager.

With Windows 10, consumers can now get security updates as they are released from Microsoft, along with other updates and new features, resulting in a “steady stream of innovation every month,” Myerson said.

Businesses can choose to get their updates as soon as they arrive, or wait to see if the patches cause any additional issues first. Microsoft will also offer the option to receive security updates only, not new feature updates, which offers organizations more control without exposing them to security gaps.

Administrators can now specify when they want patches to be applied, so the patches aren’t deployed during a busy time, or at when machines may be shut down. For organizations with limited bandwidth, Windows 10 computers can share the updates in a peer-to-peer network, rather than downloading patches for each machine.

New Services from Microsoft

In addition to updating the patching process, Microsoft also unveiled a number of new services to help better secure systems against data leakage and compromised identities:

Device Guard limits the computer to running only applications that have been administrator approved to run on that machine. This safeguard could prevent the user from unwittingly installing malware, thinking it came from an approved source.

Azure Rights Management Services is a service designed to guard against corporate data leakage. This service provides the ability to protect access to files, even after they leave the individual computer. Before sending a file to someone, a user can specify what permissions that recipient has with that file. The sender can specify, for instance, if that file can be forwarded to additional parties. The sender can even revoke access to the document after it is sent out.

Microsoft Advanced Threat Analytics provides a simple way for organizations to identify network intruders. It's based on technology developed by Israeli startup Aorato, which Microsoft acquired in November. This service can show that someone is using a brute-force attack to compromise a user account, when that account was breached and can then follow any additional actions on other machines.

These updates and service offerings give peace of mind to network administrators who must constantly remain alert to new and dangerous security threats.

10 topics it leaders

There is no shortage of change in the IT industry. Leaders can find themselves pulled in multiple directions if they try to follow every development, blog and press release. Here are a few topics that are worthy of your attention.

Cloud Technology

IT leaders must decide how to best use cloud technologies in their organization. Users want to access their data from anywhere and across multiple platforms. Balancing benefits with security is an area of great concern, especially when employees may want to use the cloud to access files from home at work and vice versa, increasing your organization's risk and exposure.

SaaS and SDN

How can you best implement Software as a Service (SaaS) and Software-Defined Networking (SDN) in your organization to access and manage applications? What benefits and risks do they bring to your organization?


The dwindling supply of IPv4 addresses has been an area of concern for IT professionals for several years. IPv6 is commonly considered to be the solution. Are your systems ready for this protocol if the need arises?


As access to tablets, smartphones and other mobile platforms increases, the need to develop software that operates cross-platform grows. What plans do you have to manage your mobile infrastructure, monitor it and provide for expansion and security?


Increasingly, employees want to bring their own devices from home to the office. Decisions must be made regarding what access the employees will have to your network and other internal resources. Analyze the risks of exposure with the rewards of having more comfortable and engaged employees.

Internet of Things

Nothing will keep your IT administrators up at night more than the Internet of Things. With the proliferation of Internet-enabled and connected devices, how can you manage risk and reduce exposure?

Big Data

Organizations collect data from a variety of sources. But that data must be segmented and analyzed to be useful. Do you have the applications and infrastructure you need to make the most of collected data?


Famously Al Capone once said that he robbed banks because that's where the money is. That is no longer necessarily the case. Personal information is the new currency and hackers have the knowledge and determination to obtain it. How can you protect your data?


Employees are bringing their own devices. Applications are moving to the cloud. Cybercrime is on the rise. Each of these creates security risks. What strategies can you develop to keep your organization safe and anticipate other areas of concern?

Privacy and Regulation

IT leaders are expected to put systems in place to protect privacy of users and remain compliant with regulations. The challenges lie in the variety of regulations you need to keep up with and the many areas where systems can be breached.

As an IT leader, it falls on you to keep your organization's technology up-to-date, secure and seamlessly integrated. Keep these topics in mind when considering where to concentrate your efforts.