Posts in it
The Importance of Information Security: Lessons Learned from the Code Spaces Breach

This breach had an extreme impact on not just Code Spaces customers, but on the future of Code Spaces itself.  Not only did a data breach occur, but data (and all associated backups) were deleted and not able to be restored.  This is an example of a worst-case scenario, and while it may not happen often, when it does it has dire consequences. 

Read More
Why IT Projects Fail... and How to Find Project Success

Unfortunately, the success rate of information technology projects is, quite simply, not very good.  In fact, some estimates place the failure rate for information technology projects at over fifty percent (Florentine, 2016).  Due to the high capital expenses, large amounts of time, and considerable staff expenses common to IT projects, these failures come with severe consequences for companies.

Read More
A Brief Introduction to Digital Forensics

As electronic devices and their associated digital storage are more commonplace than ever before, it is easy to see how their involvement in crime or other undesired events must be considered during any investigation.  For example, when considering bank fraud, it would literally be impossible to accomplish without leaving some digital traces.  For that reason, it is imperative that investigators have the appropriate tools, methods, and knowledge to gather digital evidence, present digital evidence in court, and prove that the evidence is authentic. 

Read More
Ethical Considerations for Deploying Face Authentication

After decades of use in a variety of governmental and commercial environments, face recognition technology recently found its way into mainstream consumer devices.  From Apple’s Face ID to Microsoft’s Windows Hello, face recognition technology provides a unique method of authentication that is difficult to replicate.  While the technology has reached a level of maturity for general use, some argue that the technology is far from being universally accessible.

Read More
Revisiting the Great Sony Hack of 2011

One such example of a company encountering the consequences of a large-scale data breach is that of Sony in 2011.  In April of 2011, hackers obtained personal information, including credit card numbers and bank routing information from over 100 million Playstation Network (PSN) users (Laudon & Laudon, 2016).  The breach had far-reaching negative outcomes, some of which that did not appear until years later. 

Read More
How to Disable Hardware Devices Using Windows Powershell (Video)

If you find yourself needing to disable a hardware device on hundreds, or possibly thousands, of remote endpoints, check out the video for doing so using Powershell. I hope you find it helpful and are able to incorporate the cmdlets into your existing script libraries! If you prefer a written tutorial, the quick steps are included as well.

Read More
Wireless Security Basics - Auditing Wireless Networks

The introduction of wireless networking and mobile devices carries with it specific risks and threats that must be considered when planning an information technology audit. As Stallings and Brown (2012) note, chief among these inherent risks is the fact that wireless networks present three attack vectors not necessarily present in a traditional wired network: the wireless client, the wireless access point, and the transmission medium.

Read More
How to be Proactive When Applying for IT Jobs

Applying for a job is stressful. We spend hours scouring job boards, fine-tuning our resume, drafting the perfect cover letter, and typing in the same information over and over into the online application. Then, once we have finally clicked that submit button, we are presented with the worst part of the entire process: waiting for a reply that may never come. Read on to find out how to implement a proactive approach to your job search!

Read More
10 Tips for First-Time IT Job Seekers

You have finally done it! You have made the conscious decision to pursue your dream career in Information Technology! Whether you’re a recent graduate or an experienced professional looking to change fields, finding your first IT job can seem to be a daunting task. The good news is that there has never been a better time to jump into IT….

Read More
Top 4 Skills For IT Career Growth

For this post, I would like to quickly focus on the top 4 skills for excelling in your IT career.. Now, I know that the first things that come to mind may be technical in nature, but the real secret to unbridled career success is your ability to develop and cultivate skills which require no special training, education, or access to resources.

Read More
How to Install Active Directory Users and Computers (and other RSAT tools) on Windows 10 (Video)

If you’re new to Windows server administration, one of the first things you’ll need to learn how to do is install the Active Directory Users and Computers (ADUC) console for administering the domain. Fortunately, Windows 10 has made it easier than ever!

Read More
Simple Network Commands on Mac And Windows (Video).

In this video I go over some very basic commands both on Mac and Windows and explain the differences. I plan on doing a more advanced video in the future but for now we will take a look at Ping, ipconfg/ifconfig, flushdns, and nslookup. I hope you all enjoy and please feel free to leave comments here or on the video with any questions!

Read More
How To Change the Default Location of Where Screen Captures are Saved on Mac.

In this quick How-To I’ll show you how to change the default location of where screen captures are saved for macOS. This will eliminate the need to spend time at the end of your day cleaning up your desktop of all the previous screen captures you have taken and will help keep them in a nice organized place. (For those who would rather watch a video, please watch the YouTube video below.)

Read More