All things passwords
• How Password management software can store our passwords in an encrypted format for us on every device?
• How to monitor whether your password have been stolen and are for sale on the Dark Web?
• Why it is important to rotate your passwords?
• What you should NEVER include in your password?
Since starting her consulting practice in 1997, Joy’s ability to develop solid and creative technology solutions has brought efficiency and affordability to small and medium businesses alike. Joy began her consulting practice with Hebrew Union College (HUC), for eight years. In her first role as Network Administrator (1997-2004), Joy single-handedly supported five servers and 105 computers. As Joy added more technicians to her team, it enabled her to focus on securing more small business clients, obtain Microsoft Certifications, and align LA IT Girl with the industry’s most notable vendor partners. Her extensive experience in implementing business plans, setting and achieving project goals, and developing workflow processes while utilizing the most efficient technology has resulted in bringing far more to the table than just creative technology solutions.
Picking up momentum in early 2015, Joy’s focus shifted to cyber security. Her philosophy is that offering protection and peace of mind to her clients is paramount, and continues LA IT Girl’s tradition of secure and reliable network support. Joy obtained her Security + certification and trained with the FBI on Ethical Hacking, as well as testing and implementing layers of cyber protection for her own business and her clients.
To address the cybersecurity needs of the community, Joy created Pink Hat Technology Management, a division of LA IT Girl, Inc., to offer security solutions to small and medium business owners in 2016. Joy has gained national attention for her thought leadership in cyber security solutions for small and medium-sized businesses, as she focuses intently on accident response, proactive training, and the best way to communicate gaps in vulnerability with her clients. Joy’s individualized network planning, strict attention to detail, concise communication, and service loyalty make her a well-respected and sought-after IT partner.