We have all had it before – something that has been around for a long time, and we have no idea if it is important any more – but no-one will take the ownership to declare that it can be disposed of. This is where the Scream Test comes in.… Continue Reading The Scream Test

I have learnt from my Cloud implementations that often customers hold expectations of Cloud that are not always completely effective. Based on my own experience from working with many customers, I have learnt that the following will need to be a focus; Cloud is potentially more secure than on-premises implementation. However, the… Continue Reading 6 Lessons from Cloud Implementations

A term that you may have heard used a few times may not make complete sense, so; What is Shadow IT? The term Shadow IT or Stealth IT is used to represent the implementation or usage of IT services that have not been officially created or deployed by the IT… Continue Reading Shadow IT / Stealth IT

If you are new to using the cloud, or are now deciding to move more workloads to the cloud – here are my top 10 tips for cloud adoption 1. Switch off dev/test when not using it Probably the biggest advice I can give is to understand the differences between… Continue Reading Top 10 tips for cloud adoption

Running release R minus 1? What about release R plus 45 days? We all know the Patch Tuesday update cycle where Microsoft releases their updates. It is common practice for risk-averse companies to not run the very latest release of software, instead having a policy of running “R-1” – which… Continue Reading R-1 is dead, long live R+45

Ring, ring. “Hello, is that the IT Manager? Can I ask you a few questions for a survey? <preamble here to build a relationship and feeling of trust, like complimenting the company or asking what the company does, saying that it’s impressive or hard work>. Can you tell me what… Continue Reading Information disclosure as a security risk

In a recent discussion about network security, I had a [relatively inexperienced] network administrator make a comment that security between networks can be achieved with VLANs. As most of us know, VLANs do not equal network security – but it made me wonder why she came to that conclusion, after… Continue Reading VLANs do not equal network security

How many passwords do you have? Do you remember them all? Do you use a password manager tool? Are your passwords complex and secure, or easy to guess dictionary words? What is your weakest point? I bet that last question threw you a bit. Your entire security and identity could… Continue Reading Password security in the age of Cloud

Running release N minus 1? What about release N plus 45 days? Software update best practice should mean that patches and updates are tested, but not held back when it provides known fixes. It is common practice for risk-averse companies to not run the very latest release of software, instead… Continue Reading n-1 is dead, long live N+45