Recently Updated Pages
Personally Identifiable Information
Information about a person that can be used to compromise computer systems simply by masquerading...
Vendor Assessment
how do we know which third-party vendors to do business with? uhhh just do a bunch of stuff on t...
Rules of Engagement
the parameters and expectations for third-party relationships we need to expect a certain level ...
Third Party Vendors
just don't get third partied uhhh third parties are sometimes good and sometimes bad. choose the...
P. Drippy
8========q
2.6.1 PC & Networking Tools Info
Learn to use some of the tools in an IT technician starter tool kit. ESD Wrist Strap A safety dev...
2.5.1 Maintenance Practices
Learn methods to maintain PC equipment in order to extend component life expectancy. Create a Pro...
2.3.4 Change Management
Explain basic change-management best practices. Change management is the method that companies us...
2.3.1 Professionalism
Given a scenario, use proper communication techniques and professionalism. Enterprise Standards: ...
2.2.3 Power Concerns
Learn to protect systems and manage the electrical power powering them. Types of issues you might...
2.2.2 Environmental Facts
Ensure that equipment and hazardous chemicals are disposed of properly. Remember to: consult the...
2.2.1 Environmental Concerns
Be aware of environmental concerns while working on computer systems. Disposal Some materials tha...
2.1.4 ESD Protection
Use the following guidelines to protect yourself from the risk of electrostatic discharge. Discha...
2.1.1 Safety Measures
Follow the following practices to ensure your safety when handling power components. Power Power ...
Data Governance Roles
role-based access control redux Role Description Role Owner A senior (...
Governance and Accountability
who in tel aviv can i blame for all my problems Governance practices ensure organizations abide ...
Email Security
who even still uses email anyway Email is cleartext by default. However, S/MIME and PGP are used...
Securing Embedded Systems
lock them in a white room. Smart devices are popular, but they are a black box. The consumer usu...
Embedded and Specialized Devices
An enumeration of the many types of embedded/IoT devices. Device Types Home Appliances Envir...
Mainframe
its actually real? A mainframe computer is a large, powerful computer that is capable of process...