Technology Made Simple
Friday October 15th 2021

Insider

Archives

Posts Tagged ‘Jim Guckin’

Auditing Standard: A Starting Line not a Finish Line

Auditing Standard: A Starting Line not a Finish Line

In one of the many groups I belong to, someone had asked how much do standards really help a company. My answer, as much as I wanted to be, wasn't straight-forward. I uttered a, "It depends..." I went on to explain the same thing I will here, the nuances of my thoughts. For a small company or a business that is growing these standards (NIST, [...]

Protect the Executives

Protect the Executives

For years, I've advocated spending extra attention to accounts on a network that once compromised, can cause devastation to the environment. Depending on what industry your work in, these are Executives, VIPs, Politicians, or even the C-Suite, whatever you call them, these are accounts, you may not have considered dangerous, but they can be. The [...]

Leading Remotely…Making better Leaders

Leading Remotely…Making better Leaders

Most businesses are switching to either a remote or hybrid model to help employees in these pandemic times, and employees are loving the freedom in which it brings. I've seen more than a couple managers struggle with this change, so if you have felt this way, you are not alone. Most managers are used to being able to see the people they are [...]

How to Improve your enterprise E-mail Security

How to Improve your enterprise E-mail Security

One of the things that I've noticed during my time is that phishing emails, ebb and flow like the waves of the ocean. It seems like nothing significant for a few weeks, then the flood gates open and a bunch all come in a short period of time. The security, mail and support teams get flooded with what may or may not be legitimate emails. Now [...]

Designing and Implementing a Document Control Number System

Designing and Implementing a Document Control Number System

While most mature organizations already have a well documented process for creating, approval and numbering of documents, not all do. So what do you do, when you come across one, where you a making the process. The first question, you might come across is why, do you need these documents? Those policies and procedures for your organization [...]

Don’t be afraid to fail

In the years that I have been an IT manager, there's honestly something that most people who work for me need to learn, and even some of my former colleges and bosses need to learn to accept. Don't be afraid to fail or let your employees make mistakes. I've seen many young smart talented people come into the job world and be afraid to make [...]

IT Mentality: Hire a problem solver

IT Mentality: Hire a problem solver

I have seen many variations of the same tweet over the years, and when I was younger, I'm sure I would of posted the same thing thinking I was cleaver. Only as I matured more, did my perception change on what this tweet really means. Younger me, was like I work in technology, which is why I don't trust it, now I realize there's a problem that [...]

Q&A Monday: Starting a Cyber Security Program

Question:I work for a small company and my boss recently tasked me to start to strengthen our defenses against a cyber attack, but I'm not a security expert, whats the best way to plan this out before I get started.Oda CoxNorway Answer: Thanks for the question, I'm glad you kept it at planning level because it's not something that you can do [...]

Information Security Core Knowledge

Every so often, I get asked by someone who want to get into the InfoSec field, what is at the core of knowledge that is needed. Now I know a lot of people have a lot of different answers to this question, but I think there are some things that are important, that are easier to attain. These aren't particular things to memorize, there are more [...]

How to rethink your backup strategy

One of the things that was drilled into my head when I was starting out in my IT career was the backup philosophy of 3-2-1. This stood for you should have 3 copies of your data (the production data and two backups), on 2 different media types and 1 of them being offsite. This is still the recommended method of CERT (see here). Yet I found it [...]

 Page 1 of 15  1  2  3  4  5 » ...  Last »