Pursuing an Information Tech Degree as an Adult

There are many benefits to pursuing an Information Technology degree as a working adult. Advantages include flexible degree programs, affordability and the ability to grow in your career while pursuing your degree.

Eva-IT-Main-610x265

 

Flexible Degree Programs

As a working adult, you can earn your Information Technology degree by taking courses online or on campus. A flexible IT degree program lets you plan your education around your work schedule while you are building your technical skills. This is a great option for IT students who need to balance work and family obligations while pursuing higher education. A flexible degree program supports your academic and career goals without sacrificing your other priorities. You can continue in your profession while pursuing your career goals and plan course schedules based on your personal needs. Also, with a flexible degree program, you can take more courses during times that work best for your schedule to speed up completion of your degree or reduce your course load if needed.

My sister and brother-in-law obtained their master’s degrees via online programs while working full-time jobs in order to advance their education. One of the things they loved about the online degree program was the flexibility and ability to work while still pursuing higher education. With three children, they were able to maintain full-time jobs, care for their families and pursue degrees together as a couple. After they completed their degrees, they immediately obtained higher paying jobs in STEM fields. Their degrees paid off for themselves personally and enabled them to succeed in their career goals.

 

Affordable Costs

An adult Information Technology degree program can have the advantage of affordable cost, because of scholarships and reduced commuting costs. Since you don’t have to drive to school daily, you don’t need to pay for a parking pass, gas or increased maintenance on your vehicle. If your employer offers tuition assistance or reimbursement programs, they can pay all or a percentage of the costs related to your degree program. Most importantly, you can still earn money on the job while obtaining a degree in IT.

 

Grow in Your Career While Pursuing Your Degree

One of the greatest opportunities available to adult college students is the ability to pursue your career as you pursue a degree. As your knowledge of a particular topic grows, it opens the door for your job responsibilities to grow. With a flexible degree program, you can balance life, work responsibilities and acquire technical skills and apply them to your job.

I’m compensated by University of Phoenix for this blog. As always, all thoughts and opinions are my own.

 

Lily For Target Launch Site Crashes #LilyForTarget

 

Lily Pulitzer for Target launched their new collaboration on Sunday morning with record online sales. The collaboration immediately trended with shoppers tweeting their favorite finds, but within minutes the site was reporting problems. Social Shoppers looking to score online finds were sadly disappointed to find out that they couldn’t check out their carts or that their favorite finds were sold out within minutes.

Lily-Pulitzer-For-Target-Collaboration

Lily For Target Online Shopping Experience

Some social shoppers reported that the site crashed several times. Other social shoppers tweeted their favorite finds within the store. Unfortunately, none of the items I wanted were available online and when I found an item I was unable to view the cart as I received an “Internal error 500” message, the worst thing that can happen when you are trying to purchase online. Eventually the Target website went completely offline.

 

Lily-for-target-crashes

 

 

Lily For Target In-Store Shopping Experience

The next morning I headed out to the local Target stores and sure enough EVERYTHING was sold out. As I headed out the door of the final store I found a yellow scarf that a customer discarded in the wrong aisle. Lucky me!

Lily-For-Target-Womens-Scarf-Happy-Place
When I got home I checked online sites and found my favorites online for $200 instead of $20, $30 & $40 dollars. I wasn’t surprised and didn’t give in to buy marked up items. Instead I went to the real Lily Pulitzer website where I found all the comparable items on the site were actually affordable!

If you missed out on the sales don’t buy the marked up items, shop smart and go buy the real stuff.

 

Lily for Target Launch Live Blogging & Shopper Reactions

 

Love,

Eva-TFL

#CyberMonday Deals by Women Owned Small Businesses

Happy #CyberMonday ! Don’t forget to support online businesses today! Here are a few suggestions of places to shop if you are looking for ways to support online businesses:

Chef Alejandra Schraders's Seasoning Blends

 

Small Business Recommendations


1. Chef Alejandra Seasonings – Chef Alejandra business was inspired by her desire to find natural, certified organic non-GMO spices and seasonings. Here seasoning are also certified paleo.  My favorite seasoning are the Ginger love curry and Cocoa-mon because they give vegetables, rice and meats an amazing flavor.  

I recommend the full combo pack, but if you want to get started try the Ginger love curry and check her blog for a delicious Cauliflower recipe. Use: CYBERMONDAY for 15% off and FREE shipping

Website: www.alejandraschrader.com/store/

2. Full Circle Fibers – Angela sells amazing hand-made items for yourself or as a gift. She is a very talented young lady. Santa told me I’m getting a scarf from her.  Use coupon code: GIVETHANKS to get 20% off a purchase of $10 or more. This coupon can be use on in-stock items and on custom-made items. It expires 12/7/2014.
Website: www.etsy.com/shop/fullcirclefibers


3. California Tea and Coffee Brewery – The owners are tea experts and have an online store and have been in the tea business for over a decade.   They really are the world’s best tea connoisseurs.  May I recommend the Milk Oolong or Jasmine green tea.
Website: www.caltcb.com


4. Tina Steinberg Designs – Tina’s personlized jewelry is unique.  There are never 2 pieces that are alike.  When you buy a piece from her it will leave you with a lasting impression and story to share with friends. May I recommend the Love Touch design for a memorable gift for mom or dad.
Website: www.tinasteinberg.com/


5. Ilaments Jewelry – Illaments Jewelry is designed by a very talented Latina designer.  Her jewelry are statement pieces. Check it out and thank me later.   Cyber Monday/Week Discount code: xmas14 and save 20% off.
Website: www.ilaments.net


6. Crafty Chica Shop – Latina artist, novelist, speaker, instructor, product designer has a beautiful shop.
Website: craftychica.com/shop

 

Happy Shopping!

Eva-TFL

Smart Tech Tips | 3 Ways To Avoid Being Hacked

Did the recent celebrity hack occur due to a security vulnerability with iCloud?  We still don’t know the full extent of the compromise.  However, what we do know is that the majority of hacks typically occur with the unknowing assistance of the account owner.  In fact,  most account hacks take place when someone gains access to your username and password via phishing, social engineering or weak passwords.

 

Security Computer Key In Blue Showing Privacy And Safety

Here are 3 smart tech tips to proactively protect yourself from being hacked:

 

Phishing Schemes Protection

Phishing occurs when someone tries to acquire your username, password, credit card numbers or personal information via electronic methods by masquerading as a trustworthy source.  The phishing attack can be as simple as an unsolicited email with a link from  your bank, your internet service provider, retail company or social media account.  However, when you click on the link it redirects you to another link that looks like a clone of the providers website.  The links typically contains malware, viruses or record username and passwords with failed attempts to login into your account.

To protect yourself from Phishing schemes do not click on unrecognizable links or sites from unsolicited sources.  The companies you do business with will NEVER send you unsolicited emails to change your username and account password. Also, make sure to report unsolicited emails to the company to engage IT Security teams.

 

Social Engineering Precautions

Have you ever received an unsolicited phone call or face to face request asking for personal, credit card or user account information about you, your family or coworkers?  This type of hacking technique is referred to as Social Engineering and is also a form of phishing.  The hacker(s) will use human interaction to gain your trust to access to your accounts, company secrets, company assets or strategy.  The sensitive information you unknowingly share is collected and will eventually be used against you to help the hacker bypass security safeguards and make you or your company a victim of fraud or computer access.    The interaction or phone call also leaves a weird feeling in your stomach.

To protect yourself from Social Engineering become aware of the security threat and do not share any personal information.   Minimize the amount of information you share via the phone.  Also, record the full name, phone number, company name of the offender and specific details about the interaction and report it to the affected company to engage IT Security teams.  Also,

Password Computer Key In Green Showing Permission And Security

User Names and Passwords

With the recent hacks it’s critical for online users to take an inventory and record all digital accounts: Facebook, Twitter, Email, iCloud, Instagram, Retail accounts, etc… and periodically change your passwords. Also, make note of accounts you are no longer using and consider deleting the account(s).

The most common way that hackers access user accounts is via weak passwords, such as no passwords required to access accounts, the password simply set as the word, “password” or one of your kids’ names.

To ensure the security of your user accounts:

  1. Set passwords that are 5-7 characters long and include capital letters & special characters.
  2. Change your password periodically by changing 2-3 times per year.
  3. Answer the Security Questions. The questions are put in place by the company for additional security and to protect you. Answer the questions and do not share the information with anyone.
  4. When selecting a new password consider using a paraphrase to create your new password. A paraphrase is a catchy phrase or sentence you can translate to a password.

Example of a password using a paraphrase:

I always ride the teacups at Disneyland
Password example: I@rtt@D

 

To stay informed on the recent Apple iCloud hack, check the Apple Media Advisory – Update to Celebrity Photo Investigation for up to date information.  To protect yourself from similar hacks, proactively take an inventory of your user accounts and start changing those passwords!

Follow

Get every new post delivered to your Inbox

Join other followers: