April 2, 2019

Question from a friend. 

“I have a computer with a 10-year-old processor running Windows 7. I need better performance from my computer. What should I do?”

Computers are not single task machines and pinning down the best system for the desired performance has several fact...

March 20, 2019

What topics need to be covered in cybersecurity policies?

In this post I will cover the required cybersecurity policies from various cybersecurity standards and in future posts I will cover cybersecurity procedures and cybersecurity related supporting documents.  The ta...

February 26, 2019

Email scammers have been around since the early ages of the internet. Every year new types of scams flood your inbox, asking for money or account information. These are a few of the scam emails that have already become common this year. 

Emails that start with a low ris...

January 15, 2019

As an IT auditor for local governments, one of the most often asked questions I get during audits is this: “Who should setup user access in the financial application?”  There is a debate concerning whether it should be IT or finance staff that creates accounts and is i...

October 29, 2018

You may have seen a friend request on Facebook from someone you know and had thought you were already friends with.  Not thinking anyone is trying to impersonate your friend you may accept their friend request.  Others may stop to see if you are in their current friend...

October 26, 2018

I often get called in to evaluate cybersecurity documentation, more specifically policies and procedures. One of the concerns is what to include in such documents.  For local governments, it is often easy to borrow a policy or procedure from another local government. A...

October 25, 2018

Some standards like PCI and NIST require policies that cover specific topics.  Sometimes you will see a requirement for a policy and procedure around a given topic, and other times you will see a requirement that says “policy and procedures.”  People often get hung up...

October 15, 2018

There has been a rise in the number of cyberattacks attributed to nation-states. Whether this increase is due to a rise in nation-state activity in this domain or more accurate law-enforcement detection is uncertain; however, it is time to take a look at nation-states...

October 12, 2018

As you may know October is cybersecurity awareness month. Each week has a new theme and this week is about the importance of training our children to be cyber safe and about the various careers in cybersecurity.  I have written several articles about careers in cyberse...

September 14, 2018

Many practitioners use these terms governance and management synonymously.  While there is some overlap in practice, there are key differences between governance and management of information systems.  For the highest-level stakeholders want to ensure the best use of I...

Please reload

Featured Posts

Does Security Awareness Work?

July 18, 2018

1/10
Please reload

Archive
Please reload

Follow Me
  • Facebook Basic Square
  • LinkedIn Social Icon
  • Twitter Basic Square
  • YouTube Social  Icon
  • SlideShare

© 2018 by Donald E. Hester. Proudly created with Wix.com     |    Sponsored by

  • Facebook Social Icon
  • LinkedIn Social Icon
  • Twitter Social Icon
  • YouTube Social  Icon
  • SlideShare