IT Management Blogs | Meirc Training and Consulting
Passionately developing careers for 60 years.

IT Management Blogs

Meirc’s blogs are meant to be fat-free write-ups on topics which are of interest to our clients and web-site visitors. These blogs are useful when you wish to get an update on a field you follow or when you are looking for a bite-sized article that you would like to refer to or learn from. If you wish to enquire about our products and services, please visit our Contact Us page

The Digital Footprint: Using Digital Data in Criminal Investigations

  Jan 22 2019

# IT Management

Over the years, I have written multiple articles on the subject of digital or cyber forensics and the importance it serves in supporting the modern world with regard to corporate and government incident response, first responder engagements, and more general aspects of scene-of-crime management in the digital age. Before we get into the detail, please allow me to travel back to my days in the Roy...;

Long Cast Phishing

  Nov 20 2018

# IT Management

Having encountered several friends and associates who have suffered, what seemed to be sustained Phishing Campaigns I decided to invest some time and bated-responses to set up a little research experiment to prove, or disprove a suspected theory – but for me, theories are only proven when they are put to the test, so I set the stage. ...;

What’s your IT Disaster Recovery Plan in the event of a cyberattack?

  Nov 13 2018

# IT Management

What would you do if your organization’s Information Technology (IT) systems stopped working for more than 4 weeks? Well, this happened on Tuesday 27th June 2017 when a cyberattack was unleashed, initially displayed as part of the payload for the original version of Petya Ransomware attack, now known as “NotPetya”, leading to a significant disruption on a global scale. This NotP...;

How to Work Effectively With Engineers

  Nov 4 2018

# IT Management

Having encountered several friends and associates who have suffered, what seemed to be sustained Phishing Campaigns I decided to invest some time and bated-responses to set up a little research experiment to prove, or disprove a suspected theory – but for me, theories are only proven when they are put to the test, so I set the stage. ...;

Digital Forensic And Investigation Capabilities

  Mar 27 2018

# IT Management

A question I often get asked relating to Digital Forensic and Investigation Capabilities is ‘what tools are required?’ – a question which is both easy, and difficult to answer. Easy, because the answer is ‘everything’ you need to ‘accomplish’ the task. Hard because, it is dependent on two factors which are as follows: - The level of knowledge and skill which are in place - The ty...;

Inception and the Road from Security Serendipity

  Mar 8 2017

# IT Management

You spin the top and wait to see if it continues in kinetic motion or if it falls to the pull of gravitational force. You trust that the road chosen to walk the path of serendipity toward an anticipated culmination of the correct state of scientific innovation – which, in this case, has been for...;

Malware: “Oh what a tangled web we weave…”

  Jun 16 2016

# IT Management

As I began to write this blog article, it dawned on me that this is the 30th anniversary of my IT career. My career in the wacky world of IT began in 1986 when the first mass-market of PCs and Macs were in full bloom. Microsoft DOS was the most popular operating system, running on x86 XT and AT computers. MS Windows 1.0 had just been released, Lotus Note...;

Train to the End-Goal of Pragmatics

  Jun 2 2016

# IT Management

I was in the company of two seasoned security professionals last month who had just completed CISSP training – and I found their opinions and comments very interesting indeed. The fist point of interest here was, both individuals were of the same opinion insofar as, they saw the CISSP training as a badge which could ...;

Why have an Information Technology (IT) Disaster Recovery Plan?

  May 25 2016

# IT Management

Are you taking information communication technology seriously enough? 47% of UK organisations do not haveaplanintheeventofadisaster, according to a survey carried out in 2013 by the Chartered Management Institute, identifying that some of the most experienced causes of disruption during 2012 were loss of IT (40%) and loss of Telecommunications (27%) The need for planning is supported by The ...;

The Ten Keys to Cyber-Survival

  Mar 16 2016

# IT Management

I don’t know if you have noticed, but when it comes to incident response, the methodology applied by organisations can vary from the downright chaotic, to a well-disciplined, well-oiled machine. However, from what I have observed over the preceding five years of my professional life, the general approach seems to...;