Creation of good policies and procedures is an art that can be helped with some core advice. Policies are the backbone of how a business tells their employees how to act and react, and ensures consistency and productivity. A great company culture, a consistent vision and values, and compliance with… Continue Reading Creating good policies and procedures

The English journalist Louis Theroux has a reputation for interviewing “difficult” and unusual people and subcultures, and getting a large amount of information and knowledge from people who otherwise do not open up to outsiders. The techniques and patterns that he uses to get people to open up are methods… Continue Reading Get information the Louis Theroux way

Cybersecurity is more than just firewalls and anti-virus, goes further than just zero-trust approaches and cultural changes, and is beyond just policy and compliance. Cybersecurity is not an ‘action’ or a ‘solution’ – it is an ongoing activity that needs constant review and updating. Cybersecurity Planning will vary for each… Continue Reading Cybersecurity planning

Last month, I wrote an article on the Essential 8. The article pointed out that for most of the measures, they should be the absolute minimum measures that organisations take with their systems. For those who work in the area of security, most of the Essential 8 are common-sense and… Continue Reading Obvious PCI-DSS benefits

Often misunderstood, but the concept of “design for failure” is now common in the lexicon of system design and business operations. When you design for failure, it is not because you want to fail – instead it is with the understanding that failures can and do happen, but you want… Continue Reading How to design for failures

In our ever-increasingly online lives, passwords have become a vital part of our existence. However, passwords are still the most vulnerable part of our security – because they are created and used by people, who persistently are the weakest point in any security protection. Why are passwords so easy to… Continue Reading Password tips for ease of use

We are frequently given advice on creating complex passwords, never re-using passwords, and setting up two factor authentication, but we need to consider the 2 factor authentication risks – which come about through both technology limitations and with the ever-present security weakpoint of human factors. What is 2FA? Firstly, it… Continue Reading 2 Factor Authentication risks

With the use of Software as a Service offerings increasing, with 99% of businesses projected to use one or more SaaS solutions in an industry that is worth $165Bn a year. There are 15,529 companies providing SaaS solutions , and so it seems like a logical choice to start using… Continue Reading Risks of SaaS

Does your organisation have a culture of cybersecurity? Or, is your company taking a ‘traditional’ approach with cybersecurity and considering it to be a layer that is applied by the IT department? The way that most modern organisations are evolving is that cybersecurity is a culture, not an action to… Continue Reading Cybersecurity is a culture, not an action

I will show you how to achieve successes through playing off the inherent nature of people to be lazy. There is a tendency for people – no matter how intelligent and engaged they are – to take the easiest option, and there are ways that you can use this to… Continue Reading Use the lazy option for success

Even though public cloud is mainstream, and more businesses are going “all in”. They are going for a multi-cloud, hybrid or blended cloud – yet there are still many misunderstandings in those who have not started, and many cloud myths persist. For businesses that are early on their journey to… Continue Reading Misunderstandings of Cloud

Through my study of AWS and Azure, I have found that one challenge is in understanding the terminology difference, particularly as my own background is in VMware technologies. So, I have created this little chart that compares the three.Obviously, there is no direct one-to-one mapping of the product offerings, but… Continue Reading Azure Vs. AWS terminology

I recommend that all businesses perform a paper exercise of running a BCP drill, as a way to tease out the conceptual and procedural issues related with planning for business continuity. It can be a desktop process of running through the BCP plan, and it helps to have a critical… Continue Reading The BCP Drill

It has finally happened – many years ago, when I worked at VMware, there were internal rumors of a rebootless upgrade being worked on since vSphere 5.0. And now, with the release of vSphere 6.7, you can upgrade the hypervisor without rebooting. What happens is the hypervisor will re-load, without… Continue Reading VMware rebootless upgrades are here!

We learn more from our mistakes than we do from our successes, but it is better to learn from other’s mistakes, because you don’t need to suffer. In many encounters during my career, I have learnt from the failures that occur during disasters. The disasters in disaster recovery may not… Continue Reading Disasters in disaster recovery

If you have a smartphone, you may know that if you have the OneDrive app installed, it can automatically upload your photos to OneDrive. However, the app does not allow you to upload photos automatically to OneDrive for Business. It has been an annoyance for many that Microsoft have decided… Continue Reading Copy Photos to OneDrive for Business

Disaster Recovery is the process by which an organisation recovers its business operations after a disaster. It often is a focus of the IT department, however it is a business responsibility. Business Continuity Plans are the ability for an organisation to know how they will continue to provide business operations… Continue Reading Disaster Recovery Planning – How To