Vulnerability Management

Disaster Recovery (DR) Planning

DR planning can be a challenging task. It requires gathering and documenting information from multiple sources. But it is important and equally important to keep updated. Here are some reasons to update/create a DR Plan. Hardware and systems fail Humans make mistakes User expectations — everything works all the time The cost of downtime to…

Read More

Renewed Focus on Productivity

We’ve all heard of “costs and standards of living” as it relates to wages, salaries, and benefits, but did you ever think about how that amount is calculated? It actually all boils down to productivity and the fact that in any given hour, you can produce more in terms of products and services than your…

Read More

One Billion Passwords Have Been Compromised!

In a news report it was revealed that up to 1 billion passwords have been compromised. As an IT professional we know to do. Quickly either delete the affected account or change the password. And if we use the same password or naming convention, all other accounts we have get changed too. Even with the…

Read More

Microsoft Windows 7


Microsoft has officially stopped selling Windows 7. Wait a minute and let that sink in. Windows 7 Professional was cleared for sale until October 31st and is no longer available. Unless there is stock currently available at a store. Windows 10 is listed as being supported indefinitely because, according to Microsoft, it’s the last version…

Read More

Recent Security News

I recently read an article about the NSA getting hacked. A group called Shadow Brokers claimed they hacked Equation Group (and based on the story I read, Equation Group is an NSA entity). The article went on to say that the group published what it claims are sophisticated software tools (cyber weapons) and posted that…

Read More

Endpoint Vulnerability Management

  Endpoints have been getting a lot of attention as of late. It is a target/path of least resistance from the “bad guys”. You hear about Ransomware, trojans and other propagating malware that can really impact your firm’s productivity. Of great importance is identification and reduction of vulnerabilities and also a plan of what to…

Read More