

IT Prioritization Policy
IT staff often have several projects or issues open at a time. IT staff needs a way to prioritize their time with competing priorities. At Maze & Associates we use the following guideline as part of our process. IT Decision Making and Help-desk Triage Guide Level 1 - High Priority Critical to business survival Maintain confidentiality, integrity, & availability of client data Necessary services & resources (globally) Necessary dependencies Global Scope (Enterprise wide) Lev


TCP/IP v4 Intro
Introduction to TCP/IP v 4 and Subnet Masking. This is foundational knowledge needed for any computer networking career. Here is a brief introduction by Eli the Computer Guy. This video is from The Networking Doctors #Communication #Network #Network #CNT52 #CNT #TCPIP #IP


Cybersecurity Takes Teamwork
To defeat a strong enemy: Deploy forces to defend the strategic points;
exercise vigilance in preparation, do not be indolent. Deeply investigate
the true situation, secretly await their laxity. Wait until they leave their
strongholds, then seize what they love.
— Sun Tzu Information security or cybersecurity is a team effort; all members in an organization
must support the business objectives; and information security is an
important part of that objective. #Teamwork #


5 Digital Security Tips to Protect your Online Accounts
How many of your passwords are the same? How many of your passwords follow an easy-to-guess format like QWERTY or 123456? If your answer is one or more, then you’re not alone. Security records show that 17 percent of passwords created in 2016 were “123456.” This means that almost a fifth of the population does not take their password security seriously. Making an easy-to-guess password may be the simplest thing to do, but in the past couple of years, almost half of all adults


Data Breaches on the Rise
March sees an increase in the number or records from data breaches. At least 17 companies have had breaches and the number of compromised records exceeds 1.4 billion. A majority of the records breached is from River City Media. River City Media breached email addresses of 1.37 or 1.34 billion email addresses. Fortune Magazine Article Other related news: Anonymous India hacker claims to have leaked 1.7 million SnapChat users data because SnapChat CEO Evan Spiegel said the ap


Server 2012 R2 End of Life Update
Here is a heads up…Microsoft has extended the “End-of-Extended” support date for server 2012. The original end date was Jan 10th, 2023. The new “extended” date is Oct. 10th, 2023. Thanks for nine more months Microsoft! You can check out the link below to look up any other Microsoft product to stay up to date of product life cycle. Article Microsoft Site #MSFT #WindowsServer2012 #OS #CNT


Visio Admins Best Friend
Visio is a Microsoft Office application that helps users create charts, diagrams, timelines, and illustrations. Most Network or system admins find it useful to help document network infrastructure, websites, databases and other IT systems. You can visually represent them in a diagram with Visio. They are extras and add on to help you create great diagrams. Microsoft website training for Visio Introduction Network Diagrams #Visio #Office #Training #Network #CNT #Network #CN

Happy Birthday Microsoft
Microsoft if 40 years old this year. The history of Microsoft began on April 4, 1975. Bill Gates and Paul Allen started it in Albuquerque NM. You can get the official history from Channel 9 here https://channel9.msdn.com/series/history Here is a picture of an original copy of the 8K Basic Gates and Allen made for the Altair 8800 computer. The Movie Pirates of Silicon Valley give a dramatized history of Microsoft and Apple. This Basic operating system is show in the movie


Charles Babbage's computer may be a reality soon
Charles Babbage is often called the father of modern computers for his designs on a mechanical computer in the early 1800’s. However, some of his designs have never been built. Like most people that like to tinker he had many designs that were not complete or never built. John Graham-Cumming gives a TED talk on Charles Babbage and his project to scan and catalog Babbage’s design and build the mechanical computer by the 2030’s. #History #Computer #CNT


What to do during an Active Threat
Here is a public service announcement on what to do if there is an active shooter or active threat on campus or any other public location. The Department of Homeland Security suggests that you run if you can, if not hide, out of view of the shooter or fight back. California State University Active Shooter Safety Training (Added 5 MAR 2018) Your safety is your highest priority, so leave you stuff behind and protect yourself. DHS has a pocket card for reminders find it here Up