Blog
Delicious content for your skill-up pleasure.Software Standards for IT Service
If your organization doesn't have a set of software standards, ask yourself or your IT Managers the following questions to begin documenting: What software is mandatory (business critical or daily driver)? What software is required for a particular job or business...
Read moreDoveryai, no proveryai (Trust, but verify).
Ronald Reagan on Trust
Quote by President Ronald Reagan (citing old Russian proverb)
Questions to Answer for Writing Proper Documentation
There's a trend in bringing in outside personnel to assist with documentation efforts. IT departments know they lack proper documentation and lack the time to concentrate efforts on documenting their systems. So it's understandable to want to hire specialists who...
Read moreWhen entrusted to process, you are obligated to safeguard.
Bob Johnston on Process Safeguarding
Quote by Bob Johnston, CISSP
Goals of Information Technology Support
A few months ago I was casually discussing roles of IT personnel with a law enforcement professional. This discussion was rather short as we were only briefly going over the scope of duties. However, the discussion got me thinking about how much security is integrated...
Read moreGive a man an audit and he will be secure for a day. Teach a man to audit and he will be secure for the rest of his life.
David Rhoades on Auditing
Quote by David Rhoades, WebMaven Developer
Exploring Policy Format Tips
We kicked off the exploring series by taking a look at policies. We started with recognizing policies as a major type of documentation. We moved into the importance of having policies. Then we took a look at how a policy is created and effected. In order to wrap up...
Read moreInformation security is an economics problem.
Bruce Schneier on Information Security
Quote by Bruce Schneier
Exploring the IT Policy Creation Process
We've reviewed policies as a major type of documentation and why having policies are very important. Now, let's jump into a brief overview of how a policy is created and effected. The IT policy creation process is as follows:...
Tales From Cybersecurity Leader Bios
I'm still reeling off the high from the annual Security Congress put on by (ISC)² a couple weeks ago. As I calm down, I'd like to review a few highlights from a few of the speakers. Join me as we go through a few cybersecurity leader bios, they have a few good...
Read moreSecure is an adjective, so it’s subjective to owner’s risk acceptance.
Gildas Deograt Lumy on Being Secure
Quote by Gildas Deograt Lumy, CISSP
Windows 10 New Admin Info
Windows 10 is surprisingly fun to use. It's like they took Windows 7 and Windows 8.1 and combined the two. They didn't get it all right though. This article contains some tips you should probably know when you start using it. The Problem With Windows 10 Microsoft have...
Merged Projects

Helping you study and earn IT and security certifications. Stick around for what comes next, the job!

You're your own best tech. Learn the basics of IT troubleshooting here.

Helping you raise your income when you're underpaid and underappreciated so you have more money to reinvest in yourself.