logo

Richard Muniz

Richard is a freelance IT consultant, a blogger, and a teacher for Saisoft where he teaches VMware Administration, Citrix XenApp, Disaster Planning and Recovery for IT, and Comptia Server+
Infrastructure
September 9, 2016

Good SIEM Setups Go Bad

SIEM is a system, that collects logs and other security related data for analysis.  In most cases, it installs an agent someplace that gathers security-related events from the various pieces of...
Identity
July 19, 2016

How to Secure Your Company from Rogue Administrators

Sometime back, I chronicled one of the most infamous “hacks” that ever happened. A gentleman named Jason Cornish brought the Shionogi Pharmaceutical Company to its knees. In a nutshell, he and...
Infrastructure
June 10, 2016

Tips to Avoid Detrimental Changes in VMware

Maintaining the performance and security of your virtual environment on a daily basis is an important — and non-trivial — task. VMware monitoring tools are a critical component of a solid...
Infrastructure
December 28, 2015

What To Do about Passwords in Your Disaster Recovery Plan

One post thread on Spiceworks caught my eye.  The Spicehead wanted to know what to do about passwords when it came to DR plans.  Was he supposed to put the passwords into it, or just what was he...
Infrastructure
November 13, 2015

The Actual Disaster Recovery Plan

Part two of a Disaster Recovery process is the actual plan. You have to look at what could go wrong and either eliminate the possibility it would, or at least lower the impacts. So, if you failed to...
Infrastructure
September 29, 2015

Virtualization As a Part of Disaster Recovery Plan

Mitigation (eliminating or lowering the impact of an incident) is a crucial part of any Disaster Recovery plan, as well as planning itself. I’ve always wanted to underscore the need to have this...
Infrastructure
June 12, 2015

Single Sign On: Questions to Ask

Grandpa always said, “Never try anything new. Wait and see if it kills someone first”. Recently, I’ve been involved in bringing several Single Sign On projects to fruition, and his words have...
Infrastructure
February 25, 2015

Internet Usage Policy Against Inappropriate Content

A recent posting in Spiceworks caught my attention. It seems that this admin was asked to generate an Internet usage report on a fellow employee. The next thing he knows, the employee was let go. Of...
Infrastructure
February 13, 2015

Another Vector for Malware Spread

Those who study epidemics, talk about the spread of disease through what they call “vectors”. Some are spread through food, water, human contact, and so on. In the computer world, viruses and...
Show more articles