bmalxnoa.dreamwpp.com
Open in
urlscan Pro
43.250.251.18
Public Scan
URL:
https://bmalxnoa.dreamwpp.com/
Submission: On November 24 via api from US — Scanned from AU
Submission: On November 24 via api from US — Scanned from AU
Form analysis
1 forms found in the DOMGET https://www.v-wiki.net/
<form role="search" method="get" class="search-form" action="https://www.v-wiki.net/" itemprop="potentialAction" itemscope="" itemtype="http://schema.org/SearchAction">
<meta itemprop="target" content="https://www.v-wiki.net/?s=search%20"> <span class="screen-reader-text">Search for:</span> <i class="fa fa-search"></i> <input type="search" class="search-field" placeholder="Search …" value="" name="s"
title="Search" required="" itemprop="query-input"> <button type="submit" class="search-submit"> <span>Search</span> </button>
</form>
Text Content
Skip to content VIRTUAL WIKI Virtually all I know is… Menu * About this site * Disclaimer * Hire me * About Christian Wickham CREATING GOOD POLICIES AND PROCEDURES Creation of good policies and procedures is an art that can be helped with some core advice. Policies are the backbone of how a business tells their employees how to act and react, and ensures consistency and productivity. A great company culture, a consistent vision and values, and compliance with… Continue Reading Creating good policies and procedures * Posted on: 6 August 2024 6 August 2024 * Author: Christian Wickham * Categories: Business, Culture, Opinion, Tips & Tricks, User Guides * Tags: Business Process Improvement * Leave a comment: Creating good policies and procedures LESSONS FROM THE CROWDSTRIKE INCIDENT Yesterday, there was a world-wide incident that affected computers running CrowdStrike Falcon, where there was a conflict between the vendor’s anti-malware protection and the Windows sensor, resulting in a BSOD and unresponsive computers. This is a major incident that was effectively the effective impact as we were expecting from the… Continue Reading Lessons from the CrowdStrike incident * Posted on: 20 July 2024 29 July 2024 * Author: Christian Wickham * Categories: Disaster Recovery, Opinion, Security, Strategy, War Stories * Tags: Culture, security * Leave a comment: Lessons from the CrowdStrike incident SUPPLY CHAIN AND 3RD PARTY RISKS Are you fully across your supply chain and 3rd party risks? Are you aware of all the other people outside of your organisation who could have access to your systems or data? There are many issues and threats that can occur when you lose track of who is accessing your… Continue Reading Supply chain and 3rd Party risks * Posted on: 12 June 2024 6 August 2024 * Author: Christian Wickham * Categories: Security, War Stories * Tags: Business Process Improvement, security * Leave a comment: Supply chain and 3rd Party risks N-1 PATCHING STRATEGY The technology industry is no different to many other industries and businesses – in that it has jargon and terminology that may often need to be defined to be understood. Within IT, the term “n-1” means that you are one version or release behind the most recent. This is part… Continue Reading N-1 patching strategy * Posted on: 6 May 2024 6 August 2024 * Author: Christian Wickham * Categories: Disaster Recovery, Tips & Tricks, Windows * Tags: Disaster Recovery THE TRICKERY OF HACKERS Hacking is a very asymetrical endeavour – the hacker can get big rewards for a little effort. The hackers tickery will include ways to get a unwitting victim to click on a link or to get past usual defences. As I have mentioned before, the trickery of hackers only needs… Continue Reading The trickery of hackers * Posted on: 18 April 2024 31 May 2024 * Author: Christian Wickham * Categories: Culture, Security, War Stories * Tags: security * 1 Comment on The trickery of hackers WHAT DOES DIVERSITY MEAN TO YOU? On International Women’s Day, I am reminded of the need for diversity in the workforce, and want to pose the question of what does diversity mean to you? Diversity is not just the inclusion of other races, genders and backgrounds. More than just a blind quota of non-white, non cisgender,… Continue Reading What does diversity mean to you? * Posted on: 8 March 2024 13 March 2024 * Author: Christian Wickham * Categories: Business, Culture, Leadership, Opinion * Tags: Change, Culture, Leadership, Opinion AI WILL STEAL OUR JOBS – REALLY? A fearful catch-cry recently is that AI will steal our jobs – but is this really true? Since Chat-GPT and other generative AI systems have become available, there is a broad fear that it will start to take over and force people out of their comfortably held jobs. It has… Continue Reading AI will steal our jobs – really? * Posted on: 10 February 2024 11 June 2024 * Author: Christian Wickham * Categories: Culture, Opinion * Tags: Change PII IN AUSTRALIA AND PERSONAL INFORMATION Terminology around privacy and security often will use the term “PII” – to refer to “Personally Identifiable Information”. However, PII in Australia is not a valid term – the definition by the OAIC is “personal information”, and it differs from the US term (from NIST) and the legal obligations around… Continue Reading PII in Australia and personal information * Posted on: 3 January 2024 11 January 2024 * Author: Christian Wickham * Categories: Business, Culture, Opinion, Security * Tags: security CYBERSECURITY AND DATA SOVEREIGNTY Data Sovereignty with cybersecurity is a hot question that many organisations consider to be one of their early considerations when selecting a service provider for storing their data. The intention is that important data needs to not be held in foreign datacentres, so that foreign governments cannot withhold the data… Continue Reading Cybersecurity and Data Sovereignty * Posted on: 6 November 2023 6 January 2024 * Author: Christian Wickham * Categories: Security * Tags: security GET INFORMATION THE LOUIS THEROUX WAY The English journalist Louis Theroux has a reputation for interviewing “difficult” and unusual people and subcultures, and getting a large amount of information and knowledge from people who otherwise do not open up to outsiders. The techniques and patterns that he uses to get people to open up are methods… Continue Reading Get information the Louis Theroux way * Posted on: 21 October 2023 6 January 2024 * Author: Christian Wickham * Categories: HowTo, Leadership, Opinion, Tips & Tricks * Tags: Leadership CYBERSECURITY PLANNING Cybersecurity is more than just firewalls and anti-virus, goes further than just zero-trust approaches and cultural changes, and is beyond just policy and compliance. Cybersecurity is not an ‘action’ or a ‘solution’ – it is an ongoing activity that needs constant review and updating. Cybersecurity Planning will vary for each… Continue Reading Cybersecurity planning * Posted on: 17 September 2023 6 January 2024 * Author: Christian Wickham * Categories: Security, Tips & Tricks, User Guides * Tags: Business Process Improvement, security N-1 UPDATE STRATEGY What is your strategy for patching and updates? Whilst it might be tempting to just leave your systems on auto-update, the alternative to manually delay updates to always be one behind the latest (also known as an N-1 update strategy), may also be a problem. Updates and patching of software… Continue Reading N-1 update strategy * Posted on: 6 August 2023 6 August 2024 * Author: Christian Wickham * Categories: Disaster Recovery, HowTo, Opinion, User Guides, Windows * Tags: Business Process Improvement CYBER INSURANCE MYTHS With the ever-increasing levels and frequency of attacks and impact, businesses of all sizes should consider specific cyber insurance. However there are some Cyber Insurance myths that need to be dispelled. Myth #1 – My other insurance will cover me Unless your other insurance specifically covers cyber events, you are… Continue Reading Cyber Insurance myths * Posted on: 11 July 2023 30 October 2023 * Author: Christian Wickham * Categories: Business, Opinion, Security * Tags: Backup, security FOCUS ON COMPLIANCE OR SECURITY? I have posted a few articles about different security standards and frameworks, such as PCI-DSS, The Essential 8, ISO27001, NIST and others – and in my experience, there are some organisations that focus on compliance instead of security. People desperately chase the dogma of maturity levels or complying with every… Continue Reading Focus on Compliance or Security? * Posted on: 27 June 2023 30 October 2023 * Author: Christian Wickham * Categories: Cloud, Culture, Security * Tags: Business Process Improvement, Cloud, security EDUCATE BOARDS IN CYBERSECURITY As the world becomes more aware of cybersecurity risks and issues, company boards need to become more aware of the issues that cybersecurity poses for their businesses. However, it can be difficult for non-technical people to learn the new terminologies and concepts. The question still remains on how we educate… Continue Reading Educate Boards in Cybersecurity * Posted on: 9 May 2023 12 October 2023 * Author: Christian Wickham * Categories: Business, Culture, Leadership, Security * Tags: Business Process Improvement, security DOES THE CISO NEED TO BECOME THE CSO? A question that has been around my mind for a while is “does the CISO need to become the CSO”? Is the responsibility of the Chief Information Security Officer too limiting, and should they be the Chief Security Officer? The issue with a CISO is that they often are limited… Continue Reading Does the CISO need to become the CSO? * Posted on: 7 April 2023 12 October 2023 * Author: Christian Wickham * Categories: Cloud, Leadership, Security, War Stories * Tags: security OBVIOUS PCI-DSS BENEFITS Last month, I wrote an article on the Essential 8. The article pointed out that for most of the measures, they should be the absolute minimum measures that organisations take with their systems. For those who work in the area of security, most of the Essential 8 are common-sense and… Continue Reading Obvious PCI-DSS benefits * Posted on: 10 March 2023 10 March 2023 * Author: Christian Wickham * Categories: Security, Tips & Tricks, User Guides * Tags: Business Process Improvement, security WHAT IS WRONG WITH THE ESSENTIAL 8? The Australian Cyber Security Centre, working alongside the Australian Signals Directorate (formerly Defence Signals Directorate) created a list of eight essential mitigation strategies to act as a baseline for cybersecurity. These are very much basic and essential measures, and they are an absolute minimum. As a cybersecurity professional, these are… Continue Reading What is wrong with the Essential 8? * Posted on: 18 February 2023 12 May 2023 * Author: Christian Wickham * Categories: Opinion, Security, Strategy * Tags: security, Windows THINGS NOT TO DO IN SECURITY Security is more than just activating firewalls and having complex passwords – it is a culture and an approach. There are many things that we are told to do, but also what is important is what not to do in security. Here is my list of the top 5 things… Continue Reading Things not to do in security * Posted on: 14 January 2023 8 March 2023 * Author: Christian Wickham * Categories: Business, Culture, Opinion, Security, War Stories * Tags: security CHALLENGING THE BALANCE BETWEEN SECURITY AND USABILITY It is a well-known adage in cybersecurity that there is a balance between usability and security – if you increase the security and control, you decrease usability. Conversely, to make a system user-friendly and easy to use, it has to be done at the cost of lowering security. This has… Continue Reading Challenging the balance between security and usability * Posted on: 8 December 2022 8 March 2023 * Author: Christian Wickham * Categories: Culture, Opinion, Security * Tags: security PAGINATION Page: 1 Page: 2 Page: 3 Page: 4 Page: 5 Page: 6 … Page: 9 Next page SEARCH Search for: Search ABOUT THE AUTHOR Christian Wickham Christian Wickham was the CIO for the Naval Shipbuilding College in Adelaide, South Australia. See more about Christian on LinkedIn or a summary on this site. RECENT POSTS * Creating good policies and procedures 6 August 2024 * Lessons from the CrowdStrike incident 20 July 2024 * Supply chain and 3rd Party risks 12 June 2024 * N-1 patching strategy 6 May 2024 * The trickery of hackers 18 April 2024 CATEGORIES * Business (78) * BYOD (5) * CIO (3) * Cloud (34) * Culture (70) * Disaster Recovery (33) * HowTo (48) * Leadership (9) * Opinion (119) * SDDC (6) * Security (44) * Strategy (8) * Tips & Tricks (56) * User Guides (27) * Virtualisation (37) * War Stories (24) * Windows (18) TAGS ABW (6) Agile (13) Automation (14) Availability (30) Backup (4) Business Process Improvement (60) BYOD (5) Change (30) CIO (2) Cloud (35) Culture (8) Digital Transformation (5) Disaster Recovery (30) EVC (3) Exchange (2) HA (7) Horizon View (4) IaaS (6) Leadership (6) life (3) life lessons (5) Office365 (6) Opinion (3) P2V (4) passwords (3) Performance (12) projects (30) Remote Working (4) SaaS (6) SDDC (17) security (52) SQL (4) Strategy (19) vC Ops (6) vMotion (6) VMware (35) vSphere (31) Windows (27) Zombie Servers (1) RSS FEED ARCHIVE Archive Select Month August 2024 (1) July 2024 (1) June 2024 (1) May 2024 (1) April 2024 (1) March 2024 (1) February 2024 (1) January 2024 (1) November 2023 (1) October 2023 (1) September 2023 (1) August 2023 (1) July 2023 (1) June 2023 (1) May 2023 (1) April 2023 (1) March 2023 (1) February 2023 (1) January 2023 (1) December 2022 (1) November 2022 (1) October 2022 (1) September 2022 (4) August 2022 (2) July 2022 (1) June 2022 (2) May 2022 (1) April 2022 (1) March 2022 (1) February 2022 (1) January 2022 (2) December 2021 (1) November 2021 (1) October 2021 (1) September 2021 (1) August 2021 (1) July 2021 (1) June 2021 (1) May 2021 (1) April 2021 (1) March 2021 (2) February 2021 (1) January 2021 (1) December 2020 (1) November 2020 (1) October 2020 (1) September 2020 (1) August 2020 (1) July 2020 (1) June 2020 (1) May 2020 (1) April 2020 (1) March 2020 (1) February 2020 (1) November 2019 (1) October 2019 (1) September 2019 (1) August 2019 (1) June 2019 (1) April 2019 (1) March 2019 (1) February 2019 (2) January 2019 (1) December 2018 (1) November 2018 (2) September 2018 (1) August 2018 (1) July 2018 (4) June 2018 (1) May 2018 (1) April 2018 (1) March 2018 (1) February 2018 (2) January 2018 (3) November 2017 (1) August 2017 (1) June 2017 (1) May 2017 (1) April 2017 (1) March 2017 (1) February 2017 (1) January 2017 (2) December 2016 (1) November 2016 (1) October 2016 (4) April 2016 (3) March 2016 (1) January 2016 (2) December 2015 (1) August 2015 (1) July 2015 (1) June 2015 (2) May 2015 (2) April 2015 (1) March 2015 (1) February 2015 (2) January 2015 (2) October 2014 (1) September 2014 (1) August 2014 (4) May 2014 (9) April 2014 (7) March 2014 (5) February 2014 (24) January 2014 (2) ADVERTISING This site may use advertising, read the Privacy Policy here. © 2024 Virtual Wiki. Proudly powered by WordPress. WordStar, Theme by Linesh Jose