BlogDelicious content for your skill-up pleasure.
If your organization doesn't have a set of software standards, ask yourself or your IT Managers the following questions to begin documenting: What software is mandatory (business critical or daily driver)? What software is required for a particular job or business...
Doveryai, no proveryai (Trust, but verify).
Quote by President Ronald Reagan (citing old Russian proverb)
There's a trend in bringing in outside personnel to assist with documentation efforts. IT departments know they lack proper documentation and lack the time to concentrate efforts on documenting their systems. So it's understandable to want to hire specialists who...
When entrusted to process, you are obligated to safeguard.
Quote by Bob Johnston, CISSP
A few months ago I was casually discussing roles of IT personnel with a law enforcement professional. This discussion was rather short as we were only briefly going over the scope of duties. However, the discussion got me thinking about how much security is integrated...
Give a man an audit and he will be secure for a day. Teach a man to audit and he will be secure for the rest of his life.
Quote by David Rhoades, WebMaven Developer
We kicked off the exploring series by taking a look at policies. We started with recognizing policies as a major type of documentation. We moved into the importance of having policies. Then we took a look at how a policy is created and effected. In order to wrap up...
Information security is an economics problem.
Quote by Bruce Schneier
We've reviewed policies as a major type of documentation and why having policies are very important. Now, let's jump into a brief overview of how a policy is created and effected. The IT policy creation process is as follows:...
I'm still reeling off the high from the annual Security Congress put on by (ISC)² a couple weeks ago. As I calm down, I'd like to review a few highlights from a few of the speakers. Join me as we go through a few cybersecurity leader bios, they have a few good...
Secure is an adjective, so it’s subjective to owner’s risk acceptance.
Quote by Gildas Deograt Lumy, CISSP
Windows 10 is surprisingly fun to use. It's like they took Windows 7 and Windows 8.1 and combined the two. They didn't get it all right though. This article contains some tips you should probably know when you start using it. The Problem With Windows 10 Microsoft have...
Helping you study and earn IT and security certifications. Stick around for what comes next, the job!
You're your own best tech. Learn the basics of IT troubleshooting here.
Helping you raise your income when you're underpaid and underappreciated so you have more money to reinvest in yourself.