Latest from Scott Matteson
-
Moonlighting policy
Moonlighting, the practice of working for another organization in a separate job in addition to one’s current employment, is a fairly common practice these days. It’s especially frequent in technology...
-
Top 10 things to do after a system administrator leaves their job
Staff turnover is normal. With every departing system administrator certain details must be addressed. Here's ten must-do actions.
-
Perimeter security policy
As the saying goes, a chain is only as strong as its weakest link. This applies more than ever to cybersecurity implementations designed to protect organizations from malicious attacks, intruders and ...
-
Patch management policy
Patching of operating systems, applications and devices is not usually ranked as a favorite endeavor of IT professionals, but it’s a critical pro-cess to ensure secure company operations as well as to...
-
How SIL International leveraged DevOps
Learn how DevOps brought better efficiency to one organization using a new set of tools and frameworks.
-
Artificial intelligence ethics policy
The purpose of this policy is to provide guidelines for the appropriate use of ethics involving artificial Intelligence. This policy can be customized as needed to fit the needs of your organization....
-
Wannacry ransomware attack: Industry experts offer their tips for prevention
Wannacry remains a significant threat for companies. Learn how your organization can guard against it.
-
10 tips for dealing with an online impersonator
When someone impersonates you online it can be a frightening and stressful experience. Learn how to safeguard your identity and accounts.
-
Why data breaches keep happening
Data breaches remain prevalent in the enterprise. Learn what companies are doing right--and wrong--when it comes to prevention.
-
How to prepare for and navigate a technology disaster
Technology emergencies can be the most stressful moments of an IT professional's career. But they don't have to if you plan ahead.