IT Management Blogs | Meirc Training and Consulting
Passionately developing careers for 60 years.

IT Management Blogs

Meirc’s blogs are meant to be fat-free write-ups on topics which are of interest to our clients and web-site visitors. These blogs are useful when you wish to get an update on a field you follow or when you are looking for a bite-sized article that you would like to refer to or learn from. If you wish to enquire about our products and services, please visit our Contact Us page

How to Effectively Manage an IT Crisis?

  Jun 23 2019

# IT Management

When I speak to other IT managers about some of the problems I have encountered, they look at me as if I am from another planet. How could one person have been involved with so many crises? Didn’t you ever ask yourself, David, if you were the common denominator? They could be right, of course. As one former boss said to me, “Just because you are paranoid, doesn’t mean people aren’t out to ge...;

Achieving Cyber Resilience within Organizations

  Jun 12 2019

# IT Management

I do not for one moment feel that any professional would argue that we are not facing a time of digital instability in our interwoven words of business, social media, or when we utilize some form of online service. It may be that the associated risks manifest as some cloak covered communication, with a must-read attachment sent from a LinkedIn member, who for some reason does not even posses...;

The Importance of Current Knowledge and Awareness in Cyber Security

  May 26 2019

# IT Management

When delivering the Meirc Certified Cyber Security Specialist course under the PLUS Specialty Training division, it is essential that we provide our attending participants with the very latest information on the state of Cyber Threats, and of course to offer them robust advice and knowledge on the latest products and services with which to mitigate and manage the associated state of ‘insecurity’. ...;

How to Strive for Continual Improvement within IT

  May 15 2019

# IT Management

Most large companies use ITIL as the process framework for their IT operations. ITIL was in fact created at the end of the 1980’s, so something like 30 years ago. Even version 3 was first released ten years ago with its emphasis on the service life-cycle. And given this long-standing commitment to service, you would imagine things have only got better. So, why is it that business users don’t...;

Creating a Successful IT strategy

  May 5 2019

# IT Management

For many IT managers, creating a high-quality IT strategy is probably one of the most difficult things to get right. In my experience, many IT manages struggle from the outset primarily and simply because they (and their bosses) are not clear on exactly what strategy is and what is required. The dictionary defines strategy as “a (high level) plan to achieve a long-term goal.” IT strateg...;

The Digital Footprint: Using Digital Data in Criminal Investigations

  Jan 22 2019

# IT Management

Over the years, I have written multiple articles on the subject of digital or cyber forensics and the importance it serves in supporting the modern world with regard to corporate and government incident response, first responder engagements, and more general aspects of scene-of-crime management in the digital age. Before we get into the detail, please allow me to travel back to my days in the Roy...;

Long Cast Phishing

  Nov 20 2018

# IT Management

Having encountered several friends and associates who have suffered, what seemed to be sustained Phishing Campaigns I decided to invest some time and bated-responses to set up a little research experiment to prove, or disprove a suspected theory – but for me, theories are only proven when they are put to the test, so I set the stage. ...;

What’s your IT Disaster Recovery Plan in the event of a cyberattack?

  Nov 13 2018

# IT Management

What would you do if your organization’s Information Technology (IT) systems stopped working for more than 4 weeks? Well, this happened on Tuesday 27th June 2017 when a cyberattack was unleashed, initially displayed as part of the payload for the original version of Petya Ransomware attack, now known as “NotPetya”, leading to a significant disruption on a global scale. This NotP...;

How to Work Effectively With Engineers

  Nov 4 2018

# IT Management

Having encountered several friends and associates who have suffered, what seemed to be sustained Phishing Campaigns I decided to invest some time and bated-responses to set up a little research experiment to prove, or disprove a suspected theory – but for me, theories are only proven when they are put to the test, so I set the stage. ...;

Digital Forensic And Investigation Capabilities

  Mar 27 2018

# IT Management

A question I often get asked relating to Digital Forensic and Investigation Capabilities is ‘what tools are required?’ – a question which is both easy, and difficult to answer. Easy, because the answer is ‘everything’ you need to ‘accomplish’ the task. Hard because, it is dependent on two factors which are as follows: - The level of knowledge and skill which are in place - The ty...;