Don’t Wanna Cry No More

Last Friday around lunchtime employees at several NHS hospitals around the UK received an e-mail stating a number of servers were down.  Then, one-by-one, their workstations began displaying the now tell-tale red and white background.  So started the tsunami-like wave of what is being called the “Wanna Decryptor” or “Wanna Cry” ransomware virus epidemic.  After… Read more »

Document Retention: What questions could there be in your policy?

For me, this time of year is busy trying to get my summer projects planned, the IT Budget finished, and updating policies.  One policy that is of particular interest is Document Retention.  Most people think of this policy in terms of legal issues but it is much more!  I remember purchasing a server about 15… Read more »

SOC Changes for 2017 & Cybersecurity Attest Engagements

Few people, I suspect, spend their free time combing through exposure drafts from the AICPA or the Auditing Standards Board. However, it’s our job to know what changing in the accounting and attestation standards and make sure you are aware. So there are a few changes coming your way that we recommend brushing up on… Read more »

What is Old is New Again… Cybersecurity

As a person who has spent the majority of my life experiencing amazing advances in technology all around me, I occasionally find myself losing touch with the sense that all of this technology is based on ideas that have existed for millennia. I find this to be especially true in one of the areas I… Read more »

What’s in My Bag | Stay productive

One of my favorite features on lifehacker.com is “Show Us Your Bag“. Readers snap a picture of their work or travel bag and discuss the contents, which sometimes provides good insight into improving your work process or findings cool new gadgets to incorporate into your daily routine. The other reason I’m a fan of Show… Read more »

A Case for Data Loss Prevention Tools

As a person in the IT field, I typically consider the Silicon corporate giants to be on the razor edge in terms of the technology and tools they’re using on their networks; however, all too often I find that I am seriously mistaken in that assumption. Disruptive Driving On my drive in to the office… Read more »

The Consistency of Change

In 1965 Gordon Moore, co-founder of Intel Corporation, famously said that due to the shrinking size of transistors, processors would double in speed every year. While he revised that to every 2 years, 10 years later this prediction held true until about 2009. This was known as Moore’s Law. With the speed of processors becoming… Read more »

Open or Closed?

There is no shortage of topics in the IT world that generate a lively conversation and heated discourse. Some of those topics include password requirements, maintaining data in-house versus storing it in the cloud, trusted versus untrusted scanning procedures, penetration testing versus vulnerability scan testing, Star Trek or Star Wars, etc. The possibilities are endless…. Read more »

Fool Me Once, Shame on You | Cybersecurity & Emails

It seems that Cybersecurity and emails are not going to leave the news cycle anytime soon.  Taking the politics out of this, there are some good insights to be gained.  Read on for a digest of important points from FBI/DHS report (no politics included). Small Scale, Big Impact With the release last week of the… Read more »

Resolutions are Fun but Policies are Even Better!

The Holiday Season is behind us and a new year is ahead. We have all made our resolutions to be wiser, healthier, and wealthier. This week we are all back to work with a new excitement about IT Policies… Policies are similar to resolutions except they are made to be kept. Every new year we… Read more »