Here’s my list of IT/security basics that I think IT auditors ought to know. If you can’t understand and audit these items, you do not know enough about technology to avoid having the wool pulled over your irises (not matter how good an auditor you are). The list is in no particular order.
If you’re a CISA or CISSP and you don’t know the following, I think you have some work to do.
Continue reading →
Like this:
Like Loading...
Filed under Audit, How to..., Security, Technology
Tagged as active directory, Audit, complexity, database, DHCP, DNS, IP, know, password, permissions, ping, printer, share, URL, whack, wireless, WPA
According to CIO magazine, here’s the hot IT jobs (followed by comments by me in italics):
NOTE: IT Auditors, don’t pass over this article!
1. Security specialist/ethical hacker
One specialty, computer forensics, is hot. Forensic labs are almost always behind in their work. Is it due to a lack of good technicians or that forensic folks aren’t cheap? Either answer is good news.
Continue reading →
Like this:
Like Loading...
Filed under Top 10
Tagged as business, capacity, CIO magazine, cloud computing, computer, cost savings, Denise Dubie, engineer, ethical hacker, forensics, forrester research, Gartner, gartner-speak, health records, it auditor, Linux, manager, network, network world, open source, Oracle-style pricing, permissions, process, re-engineering, saving money, Security, specialist, training, Unix, virtual systems, virtualization