Blog Home

Recent Posts:

  • Job Duties of a Security Analyst

    Job Duties of a Security Analyst

    Introduction An enterprise security operations center (SOC) analyst’s responsibilities are both wide and varied. Based on my personal experience, this is a list of duties working in the industry. If you have limited time or resources, you should consider focusing on reviewing log events. Monitor Security Systems Security systems should be continuously monitored to look

    Read More

  • Creating a Report for Senior Managers

    Creating a Report for Senior Managers

    Introduction Any employee could be called upon to write a report for senior staff. Senior managers are focused on profit and want a very brief overview of systems, people, projects under their responsibility. I recommend the report should be no more than two pages long and contain items of interest that can be shown as

    Read More

  • Export a KeePass Master Key File

    Export a KeePass Master Key File

    To in increase security, you can require a KeePass to use both a key file and a password to open the database. This makes it technically, two factor authentication (2FA). Go to file > change Master password. Check the ‘Show expert options’ Enter a new master password. Check the key file box. Select Create. When

    Read More

  • How to Command Respect from Others

    Here is some advice I saw online. I liked it so much, I am reproducing it here.

    Read More

  • Generic Outline for Writing a Policy or Procedure

    Generic Outline for Writing a Policy or Procedure

    Initial Thoughts Polices are global in nature. All company employee’s are expect to follow the guidelines. Examples of polices include: the Acceptable Use Policy (AUP), Memorandum of Understanding (MOU), or Bring Your Own Device (BYOD) to work. These a often generic guidelines that all employees must adhere to. On the other hand, procedures are typically

    Read More

  • Test your DNS Proxy using a PowerShell Script

    Test your DNS Proxy using a PowerShell Script

    Introduction Most company’s have a policy to block dangerous websites for employees. Pornography, hate, gambling, social media are all categories that should be blocked. Either, they are big time wasters, or may be required by law to be blocked. Although you may have your proxy turned on correctly, that does not mean the bill got

    Read More