Segregation of Duties and Dual Control is just as important in IT as it is in accounting. One person should…
People are the greatest threat to security. IT Risk Management is a career path in itself. Quite often, a basic…
The acronym RAID is self-explanatory why it is important for data security: Redundant array of independent disks. Not only is…
Network health is as much of proactive planning as it is maintenance. When looking at an infrastructure configured with VM’s…
Microsoft pushes out updates for OSs that it supports. Windows Server Update Services (WSUS) is a tool used to control…
A coherent structure, or in other words, a consistently and logically formed structure is essential in website design for several…
National Institute of standards and Technology (NIST) password guidelines were updated in June of 2017. The major changes are to…
What is the weakest link and the most common point of entry for unauthorized entry? People. Following are a few…
ITIL has 32 best practices when it comes to management of IT devices. The summary of the simplest best practice…
Microsoft Office 365 provides a subscription based license to their Office suite. Depending on which subscription the user purchases, it…