IT Policy

This is basicly a report of something the Phasor Burn blog linked to. Very nice blog btw, and he linked to my related rant on there, thank you for that 🙂 The original is from an alt.sysadmin.recovery post from ’99 by Mike Sphar, and it deserves reprinting: I am hired because I know what I […]

Continue reading about Phasor Burn: The Official Unofficial System Administrator Oath

Jemimus on April 6th, 2009

Today is my fourth day at the new job. In some ways I feel I have taken a step back perhaps. It feels very much like many of the companies I worked for before DHL. Medium-to-small IT departments, medium-to-small user base. A lot of overlap between the roles of helpdesk (that they called the “frontoffice” […]

Continue reading about First Impressions of new job

admin on May 28th, 2008

For your enjoyment, here is a, slightly edited, email I just sent to the department head and various other decision makers. It goes over some of the options we need to consider to solve the current issues with our internet access. Names and places have been changed to protect the guilty 😉 And please exuse […]

Continue reading about Desicionmaking on the new Proxy solution

Security Park – It is the employer not the employee who is the weakest link in a company###s IT security It is the employer not the employee who is the weakest link in a company’s IT security SurfControl has today announced the results of a new UK survey that uncovers an alarming level of complacency […]

Continue reading about Security Park – It is the employer not the employee who is the weakest link in a companies IT security

admin on March 21st, 2005

Its not been posted just yet, but various sites are reporting the release of Symantec’s Internet Security Threat Report Volume VII. Here is a link to where it probably will be posted: http://enterprisesecurity.symantec.com/content.cfm?articleid=1539 With this report, keep 2 things in mind: 1. Symantec has a vested interest in selling and marketing their own Antivirus/spam/spyware products. […]

Continue reading about Symantec Internet Security Threat Report Volume VII