Your management says it wants more analytics, but does it really support analytics? Here’s 10+ signs that indicate that your mgmt:
- Does NOT knows what it takes to get analytics off the ground
- Believes that analytics multiply like rabbits, naturally
- Is NOT willing to make the adjustments required to deliver and sustain real value.
Continue reading →
Like this:
Like Loading...
Filed under Audit, Data Analytics, How to..., Technology, Top 10, Written by Skyyler
Tagged as access, analytics, Audit, backup, challenge, champion, clean, data, dedicated, dog food, format, goals, hiring, infrastructure, interview, leader, measure, metrics, pllaning, profile, rabbit, signs, support, Top 10, transform

We all know that LinkedIn was hacked and lost at least 6.5 million hashed passwords, or at least that’s how many were was posted. Besides changing passwords, is anyone thinking about their LinkedIn lock-down/security settings? What about other social media? See further below instructions for locking down LinkedIn, Facebook, Twitter, and Google+.
Like this:
Like Loading...
Filed under Free, Security
Tagged as adaware, antivirus, backup, change, configure, eharmony, Facebook, free, google, guide, hack, i got in, incident, linkedin, lock down, log, malwarebytes, passwords, response, review, Security, social media, spybot, Twitter
If you haven’t determined how server virtualization changes your audit plans, you better get moving. I’m not just talking about a virtualization audit (more on that later), but the audits that you typically do every year or on a multi-year cycle.
For example, if every year you do an audit on all networks, servers, applications, and databases that host your key financial reporting or PHI systems, you’re looking at policies and procedures, configuration management, security (including patching), user access, logging, and so on. But do you first consider whether those assets run on virtualized servers?
Continue reading →
Like this:
Like Loading...
Filed under Audit, How to..., Security, Technology
Tagged as access, admin, Audit, backup, change, citrix, configuration, disaster, ESX, expertise, guest, host, hyper-v, policy, recovery, risk, Security, server, snapshot, Unix, user, virtual, VMWare, Windows, Xen
In Case File: Audit Server Disappeared, I noted that a friend of mine learned that IT had, on its own prerogative, wiped a server belonging to Internal Audit because “it never appeared to be used.”
Some of you already commented on some of the issues involved in this incident and the normal IT activities that should have prevented this incident (or at least alerted IT that something was wrong). Let’s review those comments and I’ll add some other details and comments.
Continue reading →
Like this:
Like Loading...
Filed under Audit, Case Files
Tagged as 2Hats, asset, Audit, audit monkey, authorization, backup, case file, change, chicken, classification, coffeeking, control, data, detection, disappearing, egg, IT, log, management, monitoring, patch, policy, retention, server, wiping
Ready for another free Dummies ebook? Now you can register for and download a free copy of Data Backup Dummies.
According to i365 (formerly EVault), the ebook describes how to:
Continue reading →
Like this:
Like Loading...