Photo taken from the top of Risshaku-ji temple, Yamadera, Yamagata, Japan. It shows temple buildings in the foreground, and a beautiful valley in the background.

A six-month review!

I’m looking back at my last post where I lamented it being two months between posts. This time, it’s been six months, hasn’t it? I hope you’ve all been well and 2024 has been kind to you so far.

Over the last six months, I’ve started between five and ten drafts of blog posts and never found the time or energy to finish them. I have some great ideas – analysis of a phishing email (I can’t figure out how best to structure it), slow productivity (hugely close to my heart at the moment), my personal 2023 reading review (when I’m terrible at putting critical review of media into words), and some others.

A screenshot of a Windows 11 desktop, showing the Company Portal app with the Apps catalogue displayed.

Ebb and flow (with an emphasis on flow)

When I started this blog, I was hoping to post weekly, or fortnightly. Unfortunately, at this point, my last post was over two months ago!

It’s just been a busy couple of months.

I’m really grateful that we were able to increase capacity in our team some time ago, but I know I’ve got a lot of work to do on myself, to make sure that I hand work over and delegate it correctly — while my role doesn’t have the responsibility of managing people, I do manage workstreams for my area of Infrastructure, and I need to take on less myself when I have a really hardworking, skilled and helpful team.

brown wooden book shelf with books

Articles of interest – 19th June ’23

A bit of a different format this week. When I’m not reading an absolute ton of books, I’m reading interesting articles to try and stay on top of what’s going on in the world, mostly in the technology sector. Here’s a host of articles I’ve read recently and thought I would share.

black and white laptop computer

“Your computer needs to restart for updates!”

I know. It feels like the updates are never-ending. And on rare occasions, an update goes wrong and you wonder if it’s worth it. Let me thank you for tolerating them and explain what the main different types of updates are, and explain why it’s so important.

person holding black phone

Staying secure and private in public

Over the weekend, I travelled to London on the train to meet up with family, and we went to see Moulin Rouge at the theatre. In both of those situations, I heard and saw some incredible potential for personal data leaks. (The show was amazing, by the way!)

On the train, we ended up seated with another group of adults who chatted for a good 90 minutes about their own financial affairs, and those of their close family and friends. Did they even think twice about who was listening? It certainly didn’t help that it was the quiet zone, and they were the only people talking.

a screenshot of a phone

MFA and password managers

I’m going to mention some products and apps I use in this post. I am not affiliated with them and these should not be perceived as recommendations from my employer.

Let’s start with some definitions. MFA stands for multi-factor authentication, which you might also know as 2FA (two-factor authentication) or 2SV (two-step verification). You sign in to an online account using your username and password, and then you have to enter a code from a text message, call, or app, or you might approve a push notification in an app. You might also plug in a security key — I have a couple of Yubikeys.

At first it feels inconvenient to have that extra step, but it stops attackers or bots from getting into your accounts if they have your password, because chances are they don’t have your phone, biometric data, or security key. You’ve probably seen simulated phishing emails as part of your IT training that might be trying to trick you into typing your work account address and password into a website that will steal them. If you do unfortunately fall victim to this, MFA will protect you if someone tries to log in with your credentials. A commonly quoted statistic is that MFA will prevent about 99% of account breaches.

Your role in application security

What do you consider when you think of the applications you use at work?

Changing my relationship with my phone

Content warning: I do briefly talk about addiction in this post. I’d like to add a further disclaimer that I don’t write this to judge anyone else’s habits, I’m just documenting my own concerns and making changes I want to see in myself. If it helps someone else make a positive change, great!

When I was about eight years old, my parents brought home our first family computer. I was absolutely terrified of doing something wrong on it, and yet here I am 25 years later with a career in IT.

On decentralisation and accessibility

When Elon purchased Twitter and started making fundamental changes, I joined the exodus to Mastodon.

The Uzbekistan incident

On Thursday morning last week, a small subset of our users were told they couldn’t log in to Microsoft services even on their work computers. It turned out that two local Internet Service Providers (ISPs), Jurassic Fibre and Wessex Internet, had been interpreted by Microsoft as originating in Uzbekistan.

Page 1 of 2

Powered by WordPress & Theme by Anders Norén