My practical insight into IT security and security life cycle. Everyone deals with restrictions, but what about monitoring, reactions, and lessons learned?
Play how to hack computer videos. I have tested hacking gadgets – Bash Bunny and Packet Squirrel. Everyone can hack, you just need to be interested and have free time!
As a network administrator, we have access to all of our customer data. That is why I put a lot of effort into security. Learn about Tier model and PAW.
The new password management system, Remote Desktop Manager, allows us to do things faster and more complexly. Learn about our RDM experience.
The technical support of other companies has become the target of several of my articles. That’s why I have decided to describe how our tech support operates. To help you evaluate us.
Technical support problems will most likely never end. This time, we have encountered a company that is basically a one-man show. And their technical support is just like that.
The monitoring system is our “most productive” employee that we have trained to meet our needs. What is it composed of? And what can it do?
How we handle our customers’ passwords. A couple of funny stories from life. And why you should ask your IT guy how he stores your passwords.
How I found out that I need a monitoring system as a network administrator. Or how I stopped working hard and tried to do it smart.
Hak5 Packet Squirrel is another hacking gadget I have tested. What Packet Squirrel can do, where did I buy it and what do I use it for?
Review of Bash Bunny. My exprience with this hacking gadget, examples of BadUSB attacks, where to buy Bash Bunny and my plans for future use.
Looking back at 2017. What interesting things have happened to us? And how has it influenced the further direction of our company PATRON-IT s.r.o.?
We are network administrator colleagues. What did we struggle with when recruiting? On what values we have finally built up PATRON-IT s.r.o. company?
The customer is impatient, emails arrive late. We are still losing the fight with MS Office 365 support because we have failed to explain that the bug is at their side.
Once, we’ve got a “cool” idea of unifying antispam for all customers on Microsoft Office 365 Exchange Online Protection. It was supposed to be a simple task.
Few questions can make “IT guys” so furious. Is Hyper-V or VMware better? We chose Hyper-V and there are 6 reasons why Hyper-V is better for us.
Practical instructions for secure data backup. Technologies and practices, we trust. In the event of an attack, be assured that the backups will survive.
We often encounter inappropriately designed customer data backups. I’m happy to share with you how we are dealing with backing up the data.
Work reports were a small revolution for us. They have allowed us to get more money for the same job while having a more satisfied customer.
Broken server, encrypted data and backup as well. How to solve it? Is it worth to pay the ransom and get the data back?