IT organizations manage security in different ways. Some companies have formalized security teams with board-level interest. In these companies, the security team will have firm policies and procedures that apply…
In the age of exploration, cartographers used to navigate around the world and map the coastlines of unexplored continents. The coastline of IT, and moreover the inner landscapes and features,…
With the influx of natural disasters, hacks, and increasingly more common ransomware, being able to recover from a disaster is quickly moving up the priority list for IT departments across…
Thus far, we have gone over how to classify our disasters and how to have some of those difficult conversations with our organization regarding Disaster Recovery (DR). We’ve also briefly…
If you have done any work in enterprise networks, you are likely familiar with the idea of a chassis switch. They have been the de facto standard for campus and…
It’s always good to have a periodic reminder to consider what we’re monitoring and why. Here’s an applicable article from my colleague Joe Kim, in which he offers some tips…
So far in this series, we’ve covered setting expectations as well as migrating to Office 365. Now that your organization is up and running on the new platform, how do…
(This is the fourth and final part of a series. You can find Part One here, Part Two here and Part Three here.) It behooves me to remind you that…
Recently, two people I respect very much tweeted about travel, and how to remain positive and grateful while you do it. You can read those tweets (here) and (here). When…
Over the last three posts, we’ve looked at Microsoft event logging use cases and identified a set of must-have event IDs. Now we’re ready to put our security policy in…