How To Disable Gatekeeper on macOS Mojave and Catalina (video)

Having difficulty installing apps remotely due to macOS Catalina security features? Sick of having to go into Security & Privacy to click "Allow" anytime you download an app?! Watch this video to see how to disable Gatekeeper (the program that blocks these settings by default) so you no longer have to struggle installing apps!

Read More
Jon the Non-Gamer: Best Darn Action Movies

We can all agree that technology, work, and work-related technology is boring af. I know you can find plenty of that boring ish on this site, albeit it may be helpful, but when you type code for fifty hours a week the last thing you need is to be plugged in during your evening or weekend.  If you are looking for quality action cinema look no further than this comprehensive list of the best action movies ever to exist.

Read More
The Importance of Information Security: Lessons Learned from the Code Spaces Breach

This breach had an extreme impact on not just Code Spaces customers, but on the future of Code Spaces itself.  Not only did a data breach occur, but data (and all associated backups) were deleted and not able to be restored.  This is an example of a worst-case scenario, and while it may not happen often, when it does it has dire consequences. 

Read More
Why IT Projects Fail... and How to Find Project Success

Unfortunately, the success rate of information technology projects is, quite simply, not very good.  In fact, some estimates place the failure rate for information technology projects at over fifty percent (Florentine, 2016).  Due to the high capital expenses, large amounts of time, and considerable staff expenses common to IT projects, these failures come with severe consequences for companies.

Read More
A Brief Introduction to Digital Forensics

As electronic devices and their associated digital storage are more commonplace than ever before, it is easy to see how their involvement in crime or other undesired events must be considered during any investigation.  For example, when considering bank fraud, it would literally be impossible to accomplish without leaving some digital traces.  For that reason, it is imperative that investigators have the appropriate tools, methods, and knowledge to gather digital evidence, present digital evidence in court, and prove that the evidence is authentic. 

Read More
New Players for a New Game: Remote IT Work and Global Possibilities

Suppose life were viewed as a game and let’s think about that for a moment. We’re all involuntarily thrusted into existence with complex rules we don’t fully understand and predictable laws running the show. Just like a game, there are winners and losers. Life is basically the weirdest MMORPG we’ll ever play.

Read More
Ethical Considerations for Deploying Face Authentication

After decades of use in a variety of governmental and commercial environments, face recognition technology recently found its way into mainstream consumer devices.  From Apple’s Face ID to Microsoft’s Windows Hello, face recognition technology provides a unique method of authentication that is difficult to replicate.  While the technology has reached a level of maturity for general use, some argue that the technology is far from being universally accessible.

Read More
Real Life Review - HyperX Pulsefire Surge RGB Gaming Mouse

The HyperX Pulsefire Surge RGB Gaming Mouse is a worthy addition to your stack of gaming peripherals. It delivers in three key areas near and dear to the hearts of PC gamers: comfort, performance, and of course, RGB! Read on for my informal thoughts on the mouse from a real life perspective; I’m not a hardware engineer, professional gamer, or UX expert, but I can tell you if this beautiful piece of gear is worth your (or your parent’s) hard earned cash!

Read More
Organizational Behavior Modification - Encouraging Desirable Behaviors

In any organization or relationship between individuals there are behaviors that are unwanted or undesirable to oneself or others. For example, in a business where productivity is limited due to established processes not being accurately followed, or on a project team where functional resources are not reporting accurate task completion dates, one party would stand to benefit from the elimination of the other’s detrimental behavior. Human beings, by nature, engage in the changing of others’ behavior.

Read More
Revisiting the Great Sony Hack of 2011

One such example of a company encountering the consequences of a large-scale data breach is that of Sony in 2011.  In April of 2011, hackers obtained personal information, including credit card numbers and bank routing information from over 100 million Playstation Network (PSN) users (Laudon & Laudon, 2016).  The breach had far-reaching negative outcomes, some of which that did not appear until years later. 

Read More
How to Disable Hardware Devices Using Windows Powershell (Video)

If you find yourself needing to disable a hardware device on hundreds, or possibly thousands, of remote endpoints, check out the video for doing so using Powershell. I hope you find it helpful and are able to incorporate the cmdlets into your existing script libraries! If you prefer a written tutorial, the quick steps are included as well.

Read More
Wireless Security Basics - Auditing Wireless Networks

The introduction of wireless networking and mobile devices carries with it specific risks and threats that must be considered when planning an information technology audit. As Stallings and Brown (2012) note, chief among these inherent risks is the fact that wireless networks present three attack vectors not necessarily present in a traditional wired network: the wireless client, the wireless access point, and the transmission medium.

Read More
Promoting Ethical Behavior in Information Technology Teams

In today’s economy, a company’s capacity to behave ethically and operate in a socially responsible manner is critical to its long-term success.  No longer is it sufficient to merely remain profitable; with the advent of the internet and the associated improvement to communication, companies are often also measured on their overall social impact.  For this reason, it is imperative that businesses, and their IT departments in particular, understand the importance of ethics in the workplace. 

Read More
How to be Proactive When Applying for IT Jobs

Applying for a job is stressful. We spend hours scouring job boards, fine-tuning our resume, drafting the perfect cover letter, and typing in the same information over and over into the online application. Then, once we have finally clicked that submit button, we are presented with the worst part of the entire process: waiting for a reply that may never come. Read on to find out how to implement a proactive approach to your job search!

Read More