Once upon a time, I needed to get a quick and dirty file integrity checking process in place for Windows systems so that we could meet a customer compliance requirement that was growing more and more popular. FIM – File Integrity Monitoring At the time, we were...
In recent years, it has become popular sport to blame information technology (IT) departments and IT leaders for failures – real or imagined – which adversely impact business operations. Even some technology trade journals seem unable to get through a single issue...
It is not every day that one gets an opportunity to put together a wish list of technology solutions that could be used to drive a modern, highly productive workplace. So, let’s begin our If Money Were No Object quest… Every office has desktops and notebooks, and...
We are only one third of the way into 2011, but we have had some of the largest information security breaches of the decade – and the trend does not appear to be slowing down. Here are just a few of the biggest reports for the year:...
Last time, I mentioned that inadequate planning is one of the key reasons why your new technology purchase might prove to be disappointing. This is true not only of planning that occurs once the project has been authorized and assigned an official “Project...