If you are in IT, audit, or security (or any other job requiring data analysis), you should NOT be cleaning data manually.
Let me share a recent experience with you….
A young IT auditor texted me at work and asked for some Active Directory user account data that I capture automatically every week, using some scheduled ACL scripts.
If you’re not familiar with my ‘Quote of the Weak’ series, I described it briefly in About. For a list of posts in this series, see here.
Continue reading →
Like this:
Like Loading...
Filed under Audit, Case Files, Data Analytics, Excel, How to..., Quote of the Weak, Security, Technology
Tagged as analysis, clean, data, drive, excel, experience, formula, manual, map, network, transform, user ID
Windows 10 has a new feature called Wifi Sense that allows you to share wifi network access with others without sharing the wifi passkey – kinda.
I don’t see any sense in using it; too risky, and rather unnecessary.
Continue reading →
Like this:
Like Loading...
Filed under Security, Technology
Tagged as account, contacts, krebs, microsoft, network, optout, Security, sense, ssid, wifi, windows 10, zdnet
I recently found a Sarbanes-Oxley (SOX) Space Lazer (sic) on a network security diagram. No kidding. The following items also appeared:
- Interstate 495
- Wang 5000
- Batphone
- Peanut butter
- Printer of evil
- Gene Hackman
- Automated Retirement Party Flyer Generation Appliance
Continue reading →
Like this:
Like Loading...
Filed under Humor/Irony, Security, Technology
Tagged as 495, appliance, batphone, ciso, diagram, evil, gene hackman, guerilla, laser, lazer, network, party, peanut butter, printer, retirement, rybolov, sarbanes-oxley, Security, sox, space, tombot, wang
An Information Week article, From CRM to Social, noted that companies consider data mined from social media as business data. Basically, companies are supplementing their customer relationship management (CRM) database with the personal data from social networks. Consider these points:
If you don’ read anything else, see the quote in red below from the Guess CIO.
Continue reading →
Like this:
Like Loading...
Filed under Security, Technology
Tagged as armstrong, business, cio, complaint, crm, data, database, dooce, Facebook, guess, maytag, media, network, opinion, social
Getting ready to take the CISA, CISM, CISSP, CIA, PMP, MCSE, or other certification exams? Here’s what you need to do to pass those tests:
Continue reading →
Like this:
Like Loading...
Filed under Audit, Certification, How to..., Security, Technology
Tagged as a+, ace, ccna, certification, cia, cisa, cisco, cism, CISSP, exam, free, itil, mcp, mcsa, msce, network, pass, pmp, practice, questions, Security, test, tips
[ W A R N I N G : The following links are often categorized by web filters as Hacking links, but only because the tools on this website are used by crackers as well as auditors and security analysts. This is a safe website, but the “watchers” at your workplace or school may not agree – BEWARE.]
UPDATE: The results of the new survey have been released...
SecTools.org is running their every-few-years survey that will “guide Nmap development and also enable a brand new and much-improved overhaul of SecTools.Org.”
Continue reading →
Like this:
Like Loading...
According to Dice, the job search site, certain certifications increase technology professionals’ salaries at all experience levels.
After surveying nearly 17,000 techies, Dice found that the following certifications draw the most additional dollars (no particular order):
Continue reading →
Like this:
Like Loading...
Filed under Audit, Certification, Security, Technology, Top 10
Tagged as a+, ccna, certification, CISSP, exam, increase, itil, Linux, mcp, mcsa, mcse, network, pay, pmp, salary, Security, study materials, Unix, vendor neutral
According to CIO magazine, here’s the hot IT jobs (followed by comments by me in italics):
NOTE: IT Auditors, don’t pass over this article!
1. Security specialist/ethical hacker
One specialty, computer forensics, is hot. Forensic labs are almost always behind in their work. Is it due to a lack of good technicians or that forensic folks aren’t cheap? Either answer is good news.
Continue reading →
Like this:
Like Loading...
Filed under Top 10
Tagged as business, capacity, CIO magazine, cloud computing, computer, cost savings, Denise Dubie, engineer, ethical hacker, forensics, forrester research, Gartner, gartner-speak, health records, it auditor, Linux, manager, network, network world, open source, Oracle-style pricing, permissions, process, re-engineering, saving money, Security, specialist, training, Unix, virtual systems, virtualization
If you probe networks, systems, and applications, you need a GOOJ card to protect yourself and your job.
In How to Stay Out of Jail, I recommended that anyone who scans, probes, or pokes networks, systems, or devices should always carry a get-out-of-jail (GOOJ) card. I also provided some reasons why such a card is critical.
Continue reading →
Like this:
Like Loading...
Filed under Audit, How to..., Security, Technology
Tagged as administrative access, application, audit committee, configuration, cracking, dumpster diving, encryption, exploits, forced entry, GOOJ, impersonation, investigations, logging, monitoring, network, probe, scanner, Security, sniffer, social engineering, system, tools, vulnerabilities, weaknesses