Trusted employees and performance

| 0 comments

The challenge that resides with job fulfillment and performance assessment is the fact that jobs and individuals are unique. Because of this fact, it is important to define processes for the hiring process as well as measuring the employees’ fulfillment of responsibilities. In order to address both areas you must examine skill, experience, behavior, motivators, and of course pay. For many organizations the onboarding and exit process are very costly therefore establishing a tool that focuses on sustainment will always yield the best results. The most important component of a job advertisement is accountability, job requirements, and a measurement that …

Continue reading

Life in a digital world means little or no privacy

| 0 comments

I want to start 2014 off by looking at security and privacy. One can argue that we are more secure today than we were just a few short years ago, but security comes at a cost and that cost is privacy. During discussions with others that I come into contact with, I am disturbed when I hear the response “if you are doing nothing illegal then you have nothing to worry about”. Obviously these individuals have not idea what privacy means. For those individuals, the Webster Dictionary defines privacy as the state of being alone. For those of you who …

Continue reading

Technology Is The Government’s Oldest Best Friend

| 0 comments

Recently we have all most likely have heard the news concerning the National Security Agency (NSA) is currently collecting the telephone records of millions of US customers of Verizon. This is extremely disturbing and while I have my own personal opinions as to what is or is not acceptable, this has clearly crossed the lines of trust in my humble opinion. In what world do we live that the government can simply cast a net so vast as to have this type of data for the purpose of seeking out those who are conducting illegal activities? I have heard others …

Continue reading

Hacking 101: Footprinting Using Nothing But A Web Browser

| 0 comments

Welcome to this article which is to introduce the idea of foot-printing when it comes to hacking. What foot-printing really means is the act of information gathering and this can be either active or passive or even and combination of both. In order to determine the vulnerabilities of a given target you must first understand the target. To this end the information you can compile over the internet can yield tremendous results and this is known as passive foot-printing. Remember to keep good notes on the information that you are able to find. These notes will come in handy later …

Continue reading

Microsoft Assessment and Planning Toolkit Explained

| 0 comments

What does the MAP toolkit do? The Microsoft Assessment and Planning (MAP) Toolkit 8.0 is an inventory, assessment, and reporting tool that helps you assess your current IT infrastructure and determine the right Microsoft technologies for your IT needs. The MAP toolkit uses Windows Management Instrumentation (WMI), Active Directory Domain Services (AD DS), SMS Provider, and other technologies to collect data in your environment and inventories computer hardware, software, and operating systems in small or large IT environments without installing any agent software on the target computers. The download is free, but it has a laundry list of prerequisites: .Net …

Continue reading

The Future of Cybersecurity Technology and Policy

| 0 comments

Only when a comprehensive understanding of the cyber threat is taken into consideration can organizations utilize process, tools, and technologies to find, correct, and combat those who launch a cyber-attack. This paper takes a look at the past, present, and future in order to present a concept that works. The idea here is a partnership with both private and public sectors in a type of responsibility where everyone works together to achieve the goal of cyber defense. This includes tools, technologies, methodology, and a common sense approach to the problem. The days of standing alone have failed and it is …

Continue reading