Jack Wozny
Jack Wozny
Home
Posts
Posts
Navigating Legal and Security Risks: Managing Access to Former Employees' Email Accounts
Accessing the email accounts of former employees, especially those terminated under contentious circumstances, is fraught with legal …
Jun 23, 2024
6 min read
Security
Governance, Risk, and Compliance References
Quick references to standards covering cybersecurity governance, risk, and compliance
Sep 2, 2023
2 min read
Security
ChatGPT is Scary Cool
ChatGPT, a large language model developed by OpenAI, has been gaining popularity exponentially in the past month. This model can …
Jan 26, 2023
2 min read
AI
Why Security Questions Are Bad
When it comes to security, using only a password to protect your personal or financial information is no longer enough. Many critical …
Aug 4, 2020
3 min read
Security
Joining Ubuntu Server to AD
Joining linux servers to Microsoft AD for user login and authentication can be a daunting task. The following is the simplest (in my …
Oct 8, 2018
4 min read
Linux
Forcing Replication of AD Partitions after Tombstone Lifetime Exceeded
When a domain controller has been offline for more than the specified tombstone lifetime, it is considered bad and will no longer …
Mar 4, 2018
1 min read
Active Directory
Loading a Signed Certificate on a Cisco WLC
Recently, I’ve been on a mission to tighten my company’s security presence, such as disabling SSL 3.0 and TLS 1.0 on all systems that …
Jul 29, 2017
2 min read
Security
Cloud Encryption Using Cryptomator
In a previous article, I mentioned storing important backups in the cloud. I’m generally cautious when it comes to storing private …
Jun 21, 2017
2 min read
Security
Injecting Drivers into Windows Install Media
Although this article may be a little late, this is a useful guide to keep on hand if servicing computers with Windows 7. I’ll update …
Apr 11, 2017
3 min read
Windows
Cite
×