Library: Never the Twain Shall Meet

cardCatalogDuring a recent visit to a library near you, I was trying to find a book via the online card catalog.

[I remember when card catalogs were on actual cards, in drawers, like the one pictured. Yikes!]

I was trying to find a book by someone who runs an analytics blog that I frequent, but I couldn’t remember the guy’s last name.

Continue reading

1 Comment

Filed under Security, Security Scout, Technology

CISSP isn’t as technical anymore


Several of my friends passed the CISSP exam recently, and told me that it isn’t as technical as I told them it would be.

They said it was more of a security manager certification.

Continue reading

11 Comments

Filed under Certification, Security

Check Excel Data for Blank and Invalid Values (Part 1 – Dropdown)

basic data analytics1You can check for blank and invalid data in Excel several ways.

Depending on the size of the file and your preferences, you can either scroll through the dropdown list, sort each column from A to Z and then Z to A, or apply a filter.

Sometimes, you need to use a combination of these methods.

It’s important to know how these methods treat data differently and to be aware of their limitations.

Continue reading

2 Comments

Filed under Audit, Data Analytics, Excel, How to...

Why You Must Validate Data

basic data analytics1Before you analyze data, you must first validate it.

Otherwise, your analysis may not be accurate, and you may miss some important insights or errors.

This post is part of the Excel: Basic Data Analytic series.

Before analyzing your data, you need to check the following:

  • Duplicate transactions do not exist.
  • Required fields/key fields do not contain blanks, spaces, zeroes, unprintable characters, or other invalid data.
  • Date fields contain real dates, and the range of dates is appropriate.
  • Amount fields don’t contain inappropriate zero, positive, or negative amounts, and the range of values is appropriate.
  • Each field is stored in the correct format. This prevents data from being converted on the fly into something else unexpectantly (e.g., user ID JUL15 becomes 15-Jul).

Continue reading

Leave a comment

Filed under Audit, Data Analytics, Excel, How to...

Why You Should Run ACL in a Virtual Machine

virtual machineRunning the desktop version of ACL in a virtual machine* (VM) has so many advantages, but I haven’t heard anyone else doing it.

Consider the following advantages, listed in order of importance (to me):

Continue reading

9 Comments

Filed under ACL, Audit, Data Analytics, Technology

Recover Pictures from SD Card

Recently a friend of mine went to Europe and took almost a 1000 pictures that she saved on 2 SD cards.

When she arrived back in the states, one of the cards could not be read by her camera or her PC. The card was corrupted.

Continue reading

4 Comments

Filed under How to..., Security