Becky is a proven problem solver with a passion for automating and streamlining processes. She has fifteen years of experience in information technology in a variety of positions from System Administration – Web Development. Her primary tech interests include NetApp, VMware, and PowerShell.

author:

Security

Information Security: Defense-in-Depth Style


Ladies and gentlemen, we’ve reached the fifth and final post of this information security in hybrid IT series. I hope you’ve found as much value in these posts as I have in your thoughtful comments. Thanks for following along. Let’s take a quick look back at …



author:

Security

The Story Patching Tells


In post #3 of this information security series, let’s cover one of the essential components in an organization’s defense strategy: their approach to patching systems. Everywhere an Attack When did you NOT see a ransomware attack or security breach story in the news? And …


author:

Security

The Weakest (Security) Link Might Be You


In the second post in this information security in a hybrid IT world series, let’s cover the best-designed security controls and measures, which are no match for the human element. “Most people don’t come to work to do a bad job” is a sentiment …