Technology

Choosing the right school to pursue a business or professional education is an important decision because attending business school can prepare you for any of a variety of careers. Information Technology is a fast paced, fascinating and rewarding career field for those with an interest in cyber security, programming, computer systems, database infrastructure and networking software and design. If you have a desire to install and service the IT and data infrastructures required to run a business today, then FORTIS can train you for entry-level positions in Information Technology.

Why Cybersecurity Jobs Are More Secure Than Most

Are you looking for a career that won’t disappear anytime soon? You may want to investigate the booming cybersecurity field. According to a recent McClatchy news article (“Want a sure-fire job? Train to fight computer hackers”), compa...
Read more »

How to Practice Enhanced Cybersecurity

We’re all aware of the importance of cybersecurity in today’s world. But, it’s not just government agencies, political parties or intelligence-related corporations that need to be more vigilant. Even the cars and planes upon which we r...
Read more »

Hacking the Hackers: Is Turnabout Fair Play?

It was only a matter of time. An Italian company that sold surveillance technology to dozens of countries, allowing their governments to hack into the computer networks of others…has itself been hacked.   Someone, or some organization, hac...
Read more »

The High Cost of Cybercrime

Everyone knows there’s a price to pay for cybercrime, which continues to grow and spread at an alarming rate. But, do you know exactly how high the price can be? Michigan-based Ponemon Institute recently conducted a study to affix a price tag to the ...
Read more »

Hacked Again! New Cyber Security Threat Emerges after China Attack

America gets a significant share of its imports from China – but it’s not just merchandise and resources that are flowing from the Eastern country. The latest wave of Chinese imports appear to be cyber-attacks! The most recent cyber-incursion encompa...
Read more »

U.S., Britain, Private Firms Participate in Cyber Security Exercise

The Pentagon, government agencies, and numerous private U.S. companies have one thing in common – all have been victimized by cyberattacks. The threats have become so prevalent that the U.S. Cyber Command, a division of the military, calls cyberattacks ...
Read more »

President Obama Advocates for Stronger Cybersecurity

During this year’s State of the Union speech, President Obama focused on the economy and middle-class workers, but he piqued bi-partisan attention when he spoke of national security issues the U.S. must address in the future – specifically, cybersecurit...
Read more »

Biggest Ongoing Cyber Security Threats for 2015 - #SonyHack Is First Glimpse

What are the biggest cyber security threats we likely will face in 2015? According to WIRED.com’s newly released predictions, here’s some of what we can expect: More nation-state attacks in which multiple networks are compromised. WIRED says tools u...
Read more »

Demand for Cyber Security is Growing

America's Next Big Career Over the past few years, the occurrences of cyber-attacks have steadily increased. Because cyber security is important to everyone, demand continues to rise for a new crop of #CyberWarriors, trained specialists who are able to...
Read more »

Millions of Cyber Attacks Happening Each Day

Cyber Security Threat: Astounding Number of Cyber Attacks How many cyber attacks do you think are launched in the United States each day? Thousands? A million? Consider this: in 2013, the Deseret News reported Utah’s secure government networks face...
Read more »

Hack Attack: What's Next for Cyber Security? #CyberWarriors Wanted

Hands down, the Sony extortion hack and security breach was 2014’s Cyberattack of the Year. WIRED.com calls the massive attack the first high-profile extortion breach that involved threats of data leaks. The attack paralyzed Sony Pictures by locking ...
Read more »

Getting “Real” in Nursing Education with Simulation Technology

What do you call a man who displays symptoms of virtually every ailment possible, but lets amateurs treat him? METIman, iStan, or various names all describe the very lifelike patient simulators used to train nurses today. Simulation labs are regarded...
Read more »

Guarding Against Cyber Attacks

Gary Lyu, Director of the Cyber Security Program at Fortis College in Salt Lake City A report from Dell SonicWall recently outlined the top cyber security challenges for 2013. They include: 1. An increase in exploit kits; 2. Rising threats agai...
Read more »

“Second Screen” Industry Taking Off

Admit it. You no longer just watch TV…you’re watching and using a smartphone or tablet at the same time. Well, you’re not alone. Combining TV-watching with simultaneous interaction on a personal device is one of the most popular leisure activities today...
Read more »

Today’s Accounting Programs

One of the things that you will notice about the programs available for accounting today is that they have an emphasis on using technology and software to help with the job. With an accounting education, you are going to be able to learn the basic skill...
Read more »

Getting an Education in Accounting Technology

The world today is a different place from what it was thirty years ago. In fact, it’s a different place from what it was just a decade ago, and things seem to be changing even faster today. Technology is the root driver of this, and in almost most cases...
Read more »

Cyber Security and Forensics is a Growing Field

Just about everyone deals with computers at some point during their day. Whether they are using them for work or surfing for fun at home, they are just about everywhere. Whenever you go to the ATM, check out at a store, or even drive your car, computers...
Read more »

What Is a Mobile App?

A mobile app is a software application that is designed and written to operate on smart phones and other mobile devices including tablets such as iPads.  They are written to function on a mobile operating system such as Android, Blackberry, Windows and ...
Read more »

Key Issues to Consider for Developing a Mobile App

Below is a short list of important items one should consider when thinking about developing mobile apps. TECHNOLOGY: Focus on Apple and Android first because together they represent more than 75% of the smartphone market.  Spend some time beforehand ...
Read more »

CyberSecurity Jobs will be on the Rise

We know that technology and computers are everywhere today, so it makes plenty of sense that jobs in the cyber security and forensics field are rising to meet demands as well.  The Washington Post recently reported that the government sees a critical ne...
Read more »
Page 1 of 2First   Previous   [1]  2  Next   Last