image

Jim Guckin

Cyber Security Leader

  • About Me
  • Resume
  • Blog
  • Podcast
  • Portfolio
  • Business Personality Test
  • Contact
Mastodon
©2022 Jim Guckin
image
Jim Guckin
IT Management

Designing and Implementing a Document Control Number System

While most mature organizations already have a well documented process for creating, approval and numbering of documents, not all do. So what do you do, when you come across one, where you a making the process. The first question, you might come across is why, do you need these documents? Those policies and procedures for…

Read More

September 22, 2021 Jim Guckin
Document ControlIT ManagementManagementPolicy
IT Management

Don’t be afraid to fail

In the years that I have been an IT manager, there’s honestly something that most people who work for me need to learn, and even some of my former colleges and bosses need to learn to accept. Don’t be afraid to fail or let your employees make mistakes.

July 14, 2021 Jim Guckin
Corporate CultureFailureIT ManagementSucceed
IT Management

IT Mentality: Hire a problem solver

I have seen many variations of the same tweet over the years, and when I was younger, I’m sure I would of posted the same thing thinking I was cleaver. Only as I matured more, did my perception change on what this tweet really means. Younger me, was like I work in technology, which is…

Read More

July 7, 2021 Jim Guckin
Thought ProcessTwitter
IT Management

How to implement Zero Trust

After answering the question from Monday I kept thinking of how the best way to start programs from scratch. One method I usually recommend is a Zero Trust security model. Now the thing I run into when talking about this, is that people think it’s an all or nothing approach, and most have many issues…

Read More

June 30, 2021 Jim Guckin
IT ManagementProjectZero Trust
Question
IT Management, Network Administration

Q&A Monday: Starting a Cyber Security Program

Question:

I work for a small company and my boss recently tasked me to start to strengthen our defenses against a cyber attack, but I’m not a security expert, whats the best way to plan this out before I get started?

June 28, 2021 Jim Guckin
AdviceMentorQ&A MondaySecurity Program
Information Security, Mentor

Information Security Core Knowledge

Every so often, I get asked by someone who wants to get into the InfoSec field, what is at the core of knowledge that is needed. Now I know a lot of people have a lot of different answers to this question, but I think there are some things that are important, that are easier to attain.

June 11, 2021 Jim Guckin
CVSSInformation SecuritySkills
Disaster Recovery, IT Management

How to rethink your backup strategy

One of the things that were drilled into my head when I was starting out in my IT career was the backup philosophy of 3-2-1.

June 9, 2021 Jim Guckin
BackupBusiness ContinuityDisaster RecoveryPlanning
Question
Questions and Answers

Q&A Monday: Defense Against Ransomware

There has been a lot in the news about ransomware, what can I do to protect myself?

June 7, 2021 Jim Guckin
Cyber HygieneCyber SecurityMalwareQ&A
Questions and Answers

Q&A Monday: Remove URL from Auto-complete in Chrome

Question: I have an incorrect website address that appears in my autocomplete list every time I start typing and I always accidentally click on it.  I tried clearing my history and it’s still there, can you help me? Alice L. LoweryOrmond Beach, FL Answer: You need to open chrome and start typing the incorrect URL until the…

Read More

May 23, 2016 Jim Guckin
Auto-completeChromeGoogleQ&A Monday
IT Management, Job Hunt

Looking for a candidate hire a learner

My number one advice, is to hire people who are willing and constantly wanting to learn, as apposed to someone who is set in their ways. In my opinion IT people generally fall into one of two categories: Niche fillers and Learners.

May 20, 2015 Jim Guckin
HiringIT ManagementLearner
Previous 1 2 3 4 … 21 Next

Recent Posts

  • Securing Beyond the Standard: Building a Culture of Lasting Security
  • Mastering the Art of Communicating Your Security Success
  • Helping Your Users Stay Safe Online Helps to Keep the Office From Catching Fire (You Know…Metaphorically Speaking)
  • What makes a good leader
  • Back to work: Security Thoughts to Have

Recent Comments

  • Didier on SysPrep a Windows 7 Upgraded Machine
  • Mike M on SysPrep a Windows 7 Upgraded Machine
  • Jim Guckin on Windows 7 FTP Server
  • ralph on Windows 7 FTP Server
  • ballroom on Google Sync and Outlook 2010 Beta

Archives

  • January 2025
  • August 2024
  • July 2024
  • January 2023
  • December 2022
  • January 2022
  • October 2021
  • September 2021
  • July 2021
  • June 2021
  • May 2016
  • May 2015
  • October 2014
  • August 2014
  • April 2014
  • March 2014
  • February 2014
  • October 2013
  • August 2013
  • March 2013
  • January 2013
  • July 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • November 2011
  • September 2011
  • August 2011
  • July 2011
  • May 2011
  • April 2011
  • March 2011
  • January 2011
  • October 2010
  • September 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009

Categories

  • Disaster Recovery
  • Home Networks
  • Information Security
  • IT Management
  • IT Strategy
  • Job Hunt
  • Linux
  • Mentor
  • National Cyber Security Awareness Month
  • Network Administration
  • News
  • Optimization
  • Questions and Answers
  • Scripts
  • Small Business
  • Smart Phones
  • Social Media
  • Software Update
  • Tools
  • Virtual Machine

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org