Skip to content

Mark In Cincinnati

Yet Another Food & Tech Blog

  • Home
  • Blog
  • Cook-Book
    • Cooking-Basics
    • Appetizers
    • Main-Dish
    • Side-Dish
    • Soups
    • Breads-Rolls
    • Desserts-Cookies
    • Sauces-Batters-Mixes
  • MyHistory
  • MyInsights
  • Tech
    • Best Practices
    • General
    • Software
    • Linux
    • Windows
  • Links
    • Software
    • Vulnerabilities
    • Investigate
    • Threat Intel & IR
    • Microsoft
    • Free Training
    • Industry
  • News

Category: Best Practices

  • Home
  • Blog
  • Tech
  • Best Practices
Best Practices Tech

Regulatory Compliance Frameworks

October 15, 2024May 6, 2025 mark_user

Introduction In the modern information age, there are numerous laws which affect the collection and

Read More
Best Practices

Tips to Safeguard Your Digital Secrets

August 1, 2024May 8, 2025 mark_user

Introduction Password manager databases, asynchronous keys, digital signatures, and MFA recovery passcodes are designed to

Read More
Best Practices Tech

Managing Your Passwords

August 1, 2024May 8, 2025 mark_user

Forward Good password habits are essential for any person who works regularly online. Due to

Read More
Best Practices

Standards & Organizational Controls (SOC)

April 29, 2024May 8, 2025 mark_user

Brief Overview Standards and Organization Controls (SOC) is an information security framework designed to help

Read More
Best Practices

Indicators of Compromise

April 26, 2024May 8, 2025 mark_user

Introduction Users, computers, and even entire networks can be all be compromised. Depending on the

Read More
Best Practices

Job Duties of a Security Analyst

April 26, 2024May 8, 2025 mark_user

Introduction An enterprise security operations center (SOC) analyst’s responsibilities are both wide and varied. Based

Read More
Best Practices

Creating a Report for Senior Managers

April 25, 2024May 8, 2025 mark_user

Introduction Any employee could be called upon to write a report for senior staff. Senior

Read More
Best Practices

Generic Outline for Writing a Policy or Procedure

April 21, 2024May 8, 2025 mark_user

Initial Thoughts Polices are global in nature. All company employee’s are expect to follow the

Read More
Best Practices

Test your DNS Proxy using PowerShell

April 17, 2024May 12, 2025 mark_user

Introduction Most company’s have a policy to block dangerous websites for employees. Pornography, hate, gambling,

Read More
July 2025
S M T W T F S
 12345
6789101112
13141516171819
20212223242526
2728293031  
« Apr    

ansible appetizers aws bash breads chicken chili cmd cooking-basics desserts dips keepass linux main-dish nmap powershell putty salsa sauces-mix-batters side-dish soups ssh windows

Recent Posts:

  • Add a Personal Package Archive to Ubuntu
  • Set Up a Putty Session w Cool Options
  • Introduction to Robocopy
  • Backup to a Remote Server using Bash
  • Managing Users & Groups in Ubuntu
All Rights Reserved 2025.
Powered by WordPress | Theme: Fairy Pro by Candid Themes.