bmalxnoa.dreamwpp.com Open in urlscan Pro
43.250.251.18  Public Scan

URL: https://bmalxnoa.dreamwpp.com/
Submission: On November 24 via api from US — Scanned from AU

Form analysis 1 forms found in the DOM

GET https://www.v-wiki.net/

<form role="search" method="get" class="search-form" action="https://www.v-wiki.net/" itemprop="potentialAction" itemscope="" itemtype="http://schema.org/SearchAction">
  <meta itemprop="target" content="https://www.v-wiki.net/?s=search%20"> <span class="screen-reader-text">Search for:</span> <i class="fa fa-search"></i> <input type="search" class="search-field" placeholder="Search …" value="" name="s"
    title="Search" required="" itemprop="query-input"> <button type="submit" class="search-submit"> <span>Search</span> </button>
</form>

Text Content

Skip to content


VIRTUAL WIKI

Virtually all I know is…

Menu
 * About this site
 * Disclaimer
 * Hire me
 * About Christian Wickham






CREATING GOOD POLICIES AND PROCEDURES

Creation of good policies and procedures is an art that can be helped with some
core advice. Policies are the backbone of how a business tells their employees
how to act and react, and ensures consistency and productivity. A great company
culture, a consistent vision and values, and compliance with… Continue Reading
Creating good policies and procedures


 * Posted on: 6 August 2024 6 August 2024
 * Author: Christian Wickham
 * Categories: Business, Culture, Opinion, Tips & Tricks, User Guides
 * Tags: Business Process Improvement
 * Leave a comment: Creating good policies and procedures
   


LESSONS FROM THE CROWDSTRIKE INCIDENT

Yesterday, there was a world-wide incident that affected computers running
CrowdStrike Falcon, where there was a conflict between the vendor’s anti-malware
protection and the Windows sensor, resulting in a BSOD and unresponsive
computers. This is a major incident that was effectively the effective impact as
we were expecting from the… Continue Reading Lessons from the CrowdStrike
incident

 * Posted on: 20 July 2024 29 July 2024
 * Author: Christian Wickham
 * Categories: Disaster Recovery, Opinion, Security, Strategy, War Stories
 * Tags: Culture, security
 * Leave a comment: Lessons from the CrowdStrike incident
   


SUPPLY CHAIN AND 3RD PARTY RISKS

Are you fully across your supply chain and 3rd party risks? Are you aware of all
the other people outside of your organisation who could have access to your
systems or data? There are many issues and threats that can occur when you lose
track of who is accessing your… Continue Reading Supply chain and 3rd Party
risks

 * Posted on: 12 June 2024 6 August 2024
 * Author: Christian Wickham
 * Categories: Security, War Stories
 * Tags: Business Process Improvement, security
 * Leave a comment: Supply chain and 3rd Party risks
   


N-1 PATCHING STRATEGY

The technology industry is no different to many other industries and businesses
– in that it has jargon and terminology that may often need to be defined to be
understood. Within IT, the term “n-1” means that you are one version or release
behind the most recent. This is part… Continue Reading N-1 patching strategy

 * Posted on: 6 May 2024 6 August 2024
 * Author: Christian Wickham
 * Categories: Disaster Recovery, Tips & Tricks, Windows
 * Tags: Disaster Recovery
   


THE TRICKERY OF HACKERS

Hacking is a very asymetrical endeavour – the hacker can get big rewards for a
little effort. The hackers tickery will include ways to get a unwitting victim
to click on a link or to get past usual defences. As I have mentioned before,
the trickery of hackers only needs… Continue Reading The trickery of hackers

 * Posted on: 18 April 2024 31 May 2024
 * Author: Christian Wickham
 * Categories: Culture, Security, War Stories
 * Tags: security
 * 1 Comment on The trickery of hackers
   


WHAT DOES DIVERSITY MEAN TO YOU?

On International Women’s Day, I am reminded of the need for diversity in the
workforce, and want to pose the question of what does diversity mean to you?
Diversity is not just the inclusion of other races, genders and backgrounds.
More than just a blind quota of non-white, non cisgender,… Continue Reading What
does diversity mean to you?

 * Posted on: 8 March 2024 13 March 2024
 * Author: Christian Wickham
 * Categories: Business, Culture, Leadership, Opinion
 * Tags: Change, Culture, Leadership, Opinion
   


AI WILL STEAL OUR JOBS – REALLY?

A fearful catch-cry recently is that AI will steal our jobs – but is this really
true? Since Chat-GPT and other generative AI systems have become available,
there is a broad fear that it will start to take over and force people out of
their comfortably held jobs. It has… Continue Reading AI will steal our jobs –
really?

 * Posted on: 10 February 2024 11 June 2024
 * Author: Christian Wickham
 * Categories: Culture, Opinion
 * Tags: Change
   


PII IN AUSTRALIA AND PERSONAL INFORMATION

Terminology around privacy and security often will use the term “PII” – to refer
to “Personally Identifiable Information”. However, PII in Australia is not a
valid term – the definition by the OAIC is “personal information”, and it
differs from the US term (from NIST) and the legal obligations around… Continue
Reading PII in Australia and personal information

 * Posted on: 3 January 2024 11 January 2024
 * Author: Christian Wickham
 * Categories: Business, Culture, Opinion, Security
 * Tags: security
   


CYBERSECURITY AND DATA SOVEREIGNTY

Data Sovereignty with cybersecurity is a hot question that many organisations
consider to be one of their early considerations when selecting a service
provider for storing their data. The intention is that important data needs to
not be held in foreign datacentres, so that foreign governments cannot withhold
the data… Continue Reading Cybersecurity and Data Sovereignty

 * Posted on: 6 November 2023 6 January 2024
 * Author: Christian Wickham
 * Categories: Security
 * Tags: security
   


GET INFORMATION THE LOUIS THEROUX WAY

The English journalist Louis Theroux has a reputation for interviewing
“difficult” and unusual people and subcultures, and getting a large amount of
information and knowledge from people who otherwise do not open up to outsiders.
The techniques and patterns that he uses to get people to open up are methods…
Continue Reading Get information the Louis Theroux way

 * Posted on: 21 October 2023 6 January 2024
 * Author: Christian Wickham
 * Categories: HowTo, Leadership, Opinion, Tips & Tricks
 * Tags: Leadership
   


CYBERSECURITY PLANNING

Cybersecurity is more than just firewalls and anti-virus, goes further than just
zero-trust approaches and cultural changes, and is beyond just policy and
compliance. Cybersecurity is not an ‘action’ or a ‘solution’ – it is an ongoing
activity that needs constant review and updating. Cybersecurity Planning will
vary for each… Continue Reading Cybersecurity planning

 * Posted on: 17 September 2023 6 January 2024
 * Author: Christian Wickham
 * Categories: Security, Tips & Tricks, User Guides
 * Tags: Business Process Improvement, security
   


N-1 UPDATE STRATEGY

What is your strategy for patching and updates? Whilst it might be tempting to
just leave your systems on auto-update, the alternative to manually delay
updates to always be one behind the latest (also known as an N-1 update
strategy), may also be a problem. Updates and patching of software… Continue
Reading N-1 update strategy

 * Posted on: 6 August 2023 6 August 2024
 * Author: Christian Wickham
 * Categories: Disaster Recovery, HowTo, Opinion, User Guides, Windows
 * Tags: Business Process Improvement
   


CYBER INSURANCE MYTHS

With the ever-increasing levels and frequency of attacks and impact, businesses
of all sizes should consider specific cyber insurance. However there are some
Cyber Insurance myths that need to be dispelled. Myth #1 – My other insurance
will cover me Unless your other insurance specifically covers cyber events, you
are… Continue Reading Cyber Insurance myths

 * Posted on: 11 July 2023 30 October 2023
 * Author: Christian Wickham
 * Categories: Business, Opinion, Security
 * Tags: Backup, security
   


FOCUS ON COMPLIANCE OR SECURITY?

I have posted a few articles about different security standards and frameworks,
such as PCI-DSS, The Essential 8, ISO27001, NIST and others – and in my
experience, there are some organisations that focus on compliance instead of
security. People desperately chase the dogma of maturity levels or complying
with every… Continue Reading Focus on Compliance or Security?

 * Posted on: 27 June 2023 30 October 2023
 * Author: Christian Wickham
 * Categories: Cloud, Culture, Security
 * Tags: Business Process Improvement, Cloud, security
   


EDUCATE BOARDS IN CYBERSECURITY

As the world becomes more aware of cybersecurity risks and issues, company
boards need to become more aware of the issues that cybersecurity poses for
their businesses. However, it can be difficult for non-technical people to learn
the new terminologies and concepts. The question still remains on how we
educate… Continue Reading Educate Boards in Cybersecurity

 * Posted on: 9 May 2023 12 October 2023
 * Author: Christian Wickham
 * Categories: Business, Culture, Leadership, Security
 * Tags: Business Process Improvement, security
   


DOES THE CISO NEED TO BECOME THE CSO?

A question that has been around my mind for a while is “does the CISO need to
become the CSO”? Is the responsibility of the Chief Information Security Officer
too limiting, and should they be the Chief Security Officer? The issue with a
CISO is that they often are limited… Continue Reading Does the CISO need to
become the CSO?

 * Posted on: 7 April 2023 12 October 2023
 * Author: Christian Wickham
 * Categories: Cloud, Leadership, Security, War Stories
 * Tags: security
   


OBVIOUS PCI-DSS BENEFITS

Last month, I wrote an article on the Essential 8. The article pointed out that
for most of the measures, they should be the absolute minimum measures that
organisations take with their systems. For those who work in the area of
security, most of the Essential 8 are common-sense and… Continue Reading Obvious
PCI-DSS benefits

 * Posted on: 10 March 2023 10 March 2023
 * Author: Christian Wickham
 * Categories: Security, Tips & Tricks, User Guides
 * Tags: Business Process Improvement, security
   


WHAT IS WRONG WITH THE ESSENTIAL 8?

The Australian Cyber Security Centre, working alongside the Australian Signals
Directorate (formerly Defence Signals Directorate) created a list of eight
essential mitigation strategies to act as a baseline for cybersecurity. These
are very much basic and essential measures, and they are an absolute minimum. As
a cybersecurity professional, these are… Continue Reading What is wrong with the
Essential 8?

 * Posted on: 18 February 2023 12 May 2023
 * Author: Christian Wickham
 * Categories: Opinion, Security, Strategy
 * Tags: security, Windows
   


THINGS NOT TO DO IN SECURITY

Security is more than just activating firewalls and having complex passwords –
it is a culture and an approach. There are many things that we are told to do,
but also what is important is what not to do in security. Here is my list of the
top 5 things… Continue Reading Things not to do in security

 * Posted on: 14 January 2023 8 March 2023
 * Author: Christian Wickham
 * Categories: Business, Culture, Opinion, Security, War Stories
 * Tags: security
   


CHALLENGING THE BALANCE BETWEEN SECURITY AND USABILITY

It is a well-known adage in cybersecurity that there is a balance between
usability and security – if you increase the security and control, you decrease
usability. Conversely, to make a system user-friendly and easy to use, it has to
be done at the cost of lowering security. This has… Continue Reading Challenging
the balance between security and usability

 * Posted on: 8 December 2022 8 March 2023
 * Author: Christian Wickham
 * Categories: Culture, Opinion, Security
 * Tags: security
   


PAGINATION

Page: 1 Page: 2 Page: 3 Page: 4 Page: 5 Page: 6 … Page: 9 Next page


SEARCH

Search for: Search


ABOUT THE AUTHOR

Christian Wickham




Christian Wickham was the CIO for the Naval Shipbuilding College in Adelaide,
South Australia.
See more about Christian on LinkedIn or a summary on this site.


RECENT POSTS

 * Creating good policies and procedures 6 August 2024
 * Lessons from the CrowdStrike incident 20 July 2024
 * Supply chain and 3rd Party risks 12 June 2024
 * N-1 patching strategy 6 May 2024
 * The trickery of hackers 18 April 2024



CATEGORIES

 * Business (78)
 * BYOD (5)
 * CIO (3)
 * Cloud (34)
 * Culture (70)
 * Disaster Recovery (33)
 * HowTo (48)
 * Leadership (9)
 * Opinion (119)
 * SDDC (6)
 * Security (44)
 * Strategy (8)
 * Tips & Tricks (56)
 * User Guides (27)
 * Virtualisation (37)
 * War Stories (24)
 * Windows (18)



TAGS

ABW (6) Agile (13) Automation (14) Availability (30) Backup (4) Business Process
Improvement (60) BYOD (5) Change (30) CIO (2) Cloud (35) Culture (8) Digital
Transformation (5) Disaster Recovery (30) EVC (3) Exchange (2) HA (7) Horizon
View (4) IaaS (6) Leadership (6) life (3) life lessons (5) Office365 (6) Opinion
(3) P2V (4) passwords (3) Performance (12) projects (30) Remote Working (4) SaaS
(6) SDDC (17) security (52) SQL (4) Strategy (19) vC Ops (6) vMotion (6) VMware
(35) vSphere (31) Windows (27) Zombie Servers (1)


RSS FEED



ARCHIVE

Archive Select Month August 2024  (1) July 2024  (1) June 2024  (1) May 2024
 (1) April 2024  (1) March 2024  (1) February 2024  (1) January 2024  (1)
November 2023  (1) October 2023  (1) September 2023  (1) August 2023  (1) July
2023  (1) June 2023  (1) May 2023  (1) April 2023  (1) March 2023  (1) February
2023  (1) January 2023  (1) December 2022  (1) November 2022  (1) October 2022
 (1) September 2022  (4) August 2022  (2) July 2022  (1) June 2022  (2) May 2022
 (1) April 2022  (1) March 2022  (1) February 2022  (1) January 2022  (2)
December 2021  (1) November 2021  (1) October 2021  (1) September 2021  (1)
August 2021  (1) July 2021  (1) June 2021  (1) May 2021  (1) April 2021  (1)
March 2021  (2) February 2021  (1) January 2021  (1) December 2020  (1) November
2020  (1) October 2020  (1) September 2020  (1) August 2020  (1) July 2020  (1)
June 2020  (1) May 2020  (1) April 2020  (1) March 2020  (1) February 2020  (1)
November 2019  (1) October 2019  (1) September 2019  (1) August 2019  (1) June
2019  (1) April 2019  (1) March 2019  (1) February 2019  (2) January 2019  (1)
December 2018  (1) November 2018  (2) September 2018  (1) August 2018  (1) July
2018  (4) June 2018  (1) May 2018  (1) April 2018  (1) March 2018  (1) February
2018  (2) January 2018  (3) November 2017  (1) August 2017  (1) June 2017  (1)
May 2017  (1) April 2017  (1) March 2017  (1) February 2017  (1) January 2017
 (2) December 2016  (1) November 2016  (1) October 2016  (4) April 2016  (3)
March 2016  (1) January 2016  (2) December 2015  (1) August 2015  (1) July 2015
 (1) June 2015  (2) May 2015  (2) April 2015  (1) March 2015  (1) February 2015
 (2) January 2015  (2) October 2014  (1) September 2014  (1) August 2014  (4)
May 2014  (9) April 2014  (7) March 2014  (5) February 2014  (24) January 2014
 (2)


ADVERTISING

This site may use advertising, read the Privacy Policy here.



© 2024  Virtual Wiki. Proudly powered by WordPress. WordStar, Theme by Linesh
Jose