IT teams handle layoffs with a structured approach to ensure security and compliance while minimizing disruptions. Here’s a general overview of the process after HR communicates the list of impacted employees and the timeline: IT places a priority on access revocation and device management as these must be planned and executed on short notice. The […]
Author: Jay
World Backup Day
Don’t be like Wile E. Coyote have a plan B (backup). March 31st is celebrated as World Backup Day, a global initiative to remind individuals and businesses of the importance of safeguarding their digital data. It started in 2011 as a playful yet serious campaign by Maxtor—timed perfectly before April Fool’s Day. Our Backup Recovery […]
Orphan SIDS create openings for hackers
Bad actors can exploit orphaned SIDs (Security Identifiers) in several ways, primarily targeting vulnerabilities in access control lists (ACLs). Here’s how: To mitigate these risks, regular audits of ACLs and the removal of orphaned SIDs are essential. However, searching for orphaned SIDS turns good hardworking IT Administrators into single focus soulless creatures like Lensor from […]
Memory Safe Programming
Ransomware can exploit memory vulnerabilities in several ways, often targeting flaws in memory management to execute malicious code or gain unauthorized access. Here are some common methods:1. Buffer Overflows: Attackers exploit vulnerabilities where a program writes more data to a buffer than it can hold, allowing them to overwrite adjacent memory and execute arbitrary code.2. […]
Would DevSecOps exist without Bitcoin?
Long ago in the time “Before the Internet” IT departments had developers that created applications and handed the code to QA testers that verified the functionality. Then the Operators put it into production and monitored it so that the help desk would not get calls from angry users. If you know what a 3270 terminal […]