Where are the Real Vulnerabilities?
Many organizations perform regular vulnerability scans but have a hard time eliminating the vulnerabilities. Many have told me it is...
IT Prioritization Policy
IT staff often have several projects or issues open at a time. IT staff needs a way to prioritize their time with competing priorities. ...
TCP/IP v4 Intro
Introduction to TCP/IP v 4 and Subnet Masking. This is foundational knowledge needed for any computer networking career. Here is a brief...
Cybersecurity Takes Teamwork
To defeat a strong enemy: Deploy forces to defend the strategic points; exercise vigilance in preparation, do not be indolent. Deeply...
5 Digital Security Tips to Protect your Online Accounts
How many of your passwords are the same? How many of your passwords follow an easy-to-guess format like QWERTY or 123456? If your answer...
Data Breaches on the Rise
March sees an increase in the number or records from data breaches. At least 17 companies have had breaches and the number of...
Server 2012 R2 End of Life Update
Here is a heads up…Microsoft has extended the “End-of-Extended” support date for server 2012. The original end date was Jan 10th, 2023....
Visio Admins Best Friend
Visio is a Microsoft Office application that helps users create charts, diagrams, timelines, and illustrations. Most Network or system...
Happy Birthday Microsoft
Microsoft if 40 years old this year. The history of Microsoft began on April 4, 1975. Bill Gates and Paul Allen started it in...
Charles Babbage's computer may be a reality soon
Charles Babbage is often called the father of modern computers for his designs on a mechanical computer in the early 1800’s. However,...