
Top IT Management Certifications
So your here to find out what top IT Management Certifications you can get to get a leg up in your current position or to be promoted to IT Management. I’ve been and IT Manager for a few years and it is definitely challenging work. I was mostly a technical person and for me the aspect of having to handle employees and growing the social skills required was rough, even to this day it is something I must keep working on.
If you want to succeed as an IT manager you will need to have a working knowledge of cyber security, storage, hardware, software, networking and management frameworks and then use all that knowledge ad methodologies to improve the business.
Top IT Management Certifications
- AMA Certified Professional in Management
- Certified Information Security Manager (CISM)
- Certified Associate in Project Management (CAPM)
- Certified in the Governance of Enterprise IT (CGEIT)
- Information Technology

Fraud Awareness: What Does Fraud Look Like?
Fraud happens every day and you and your employees may not even know that you have been defrauded out of your information or money. Cyber Fraud is real and you must be vigilant.
Identifying when someone is trying to defraud you or your organization is a vital part of the day-to-day responsibilities of your employees. Here are a few red flags that might indicate a fraud attempt:
Large orders:
- When a fraudster uses stolen payment methods, they will attempt to maximize spending in a single transaction before the victim realizes their information has been stolen.
Multiple transactions in a short period of time:
- This could be a sign that someone gained unauthorized access to a customer’s account or that someone is attempting to max out a stolen credit card.
Fast shipping:
- Most consumers choose affordable shipping options. Beware of overnight or priority shipments, especially those that involve high-priced orders.
Unusual
… Read the rest
Staying Safe In The Cloud
I’m sure by now your company has you working with some cloud applications like Microsoft 365, Google Docs, Dropbox and Salesforce just to name a few. You need to be vigilant because hackers can use tactics to trick you into fake landing portals.
Did you know that Nearly 80% of organizations have experienced a cloud security hack in the past 18 months? Did you know $4.41 million is the average cost for an organization when its cloud services are hacked? Also, cloud-based cyberattacks rose 630% in a recent 3-month period. Obviously cybercrime is on the rise and hackers find creative ways into tricking you.
There is no such thing as a completely safe cloud provider and the way you go about using the cloud can have a significant impact for your organization. In these four scenarios, we will explore the security risks and tips associated with each.
… Read the rest
Scenario 1
Your

How to Fix Offscreen window programs back to desktop
There may have been a few times where a program may not show up on your desktop and and it seems to show up offscreen some where. You know its open because you see a thumbnail overview. We have a simple and obvious fix for this offscreen windows programs.
Follow these steps:
- Locate your task bar, by default its at the bottom of your screen.
- Right click an open area of your task bar with your mouse pointer.
- A window will open up click [ Cascade windows ]
This should have resolved the issue with your window hiding on you some where.
… Read the rest
Have You Heard Of Text Message Scams Called Smishing?
Have you ever received unsolicited mobile text messages with an unfamiliar or strange web link? Well this is a trick to target recipients into clicking a link and sending the attacker private information or downloading malicious programs to a smartphone.
Fewer people are aware of the dangers of clicking links in text messages and they happen to be more trusting of text messages, so smishing is often a lucrative endeavor for obtaining credentials, banking information and private data.
Smishing is a form of phishing that involves text messaging. Victims will typically receive a deceptive text message that is intended to lure you into providing your personal or financial information. These scammers often attempt to disguise themselves as a government agency, bank, or other high ranking companies.
These criminals are looking to obtain your personally identifiable information (PII) such as: account usernames and passwords, Social Security number, date of birth, credit … Read the rest

Why Cybersecurity Matters For Your Small Business
Cybersecurity is a crucial element for continued success in any industry. What I am sharing with you today are reasons why cybersecurity matters for your small business.
To succeed in today’s technical ecosystem cybersecurity must be part of your small to medium-sized business operations. So the same way that you’d never leave your store or office unlocked and vulnerable to street crime, you should never leave any aspect of your business network unprotected without security. Myself and many other managed service providers can provide a fully up-to-date understanding of cybersecurity — how to help you mitigate the risks and build cyber-resilience.
Why Cybersecurity Matters
Hackers and cybercriminals are getting more sophisticated each year, devising new, creative ways to fool people into handing over money or data. In some instances, they can target your systems without interacting with anyone at the company. There are many cyber security professionals but what really … Read the rest

A macOS 0-day vulnerability let hackers take screenshots
A macOS 0-day vulnerability lets hackers take screenshots of your screen. Hackers have been exploiting a vulnerability in fully updated versions of macOS that allowed them to take screenshots on infected Macs without having to get permissions from any users. However, this attack is finally getting patched with the latest macOS 11.4 update released on May 24th, 2021. If you haven’t already, update your machine today.
The zero-day was exploited by XCSSET, the malware was discovered by security firm Trend Micro. XCSSET used what at the time were two zero-days aimed at developers, specifically their Xcode projects, which then got passed on to regular users.
No one really knows how many Macs are infected, but in a statement from TechCrunch, Apple confirmed that the exploit is no longer an issue after updating to the latest version, the macOS Big Sur 11.4 update.
… Read the rest
VMware vCenter VMSA-2021-0010 Advisory
In this VMware vCenter VMSA-2021-0010 Advisory, VMware vCenter Server updates address remote code execution and authentication vulnerabilities (CVE-2021-21985, CVE-2021-21986).
VMware Impacted Products?
- VMware vCenter Server (vCenter Server)
- VMware Cloud Foundation (Cloud Foundation)
Who is affected?
VMware Security Advisories always list the specific product versions that are affected. In this case it is vCenter Server 6.5, 6.7, and 7.0.
What’s Happening?
In this VMware Advisory they have discovered multiple vulnerabilities in the vSphere Client (HTML5). If the hacker has access to point 443 they could exploit a vulnerability that would allow commands to be executed with unrestricted privileges. VMware advised to update your servers right now!
How to protect your servers.
You can protect yourself by patching vCenter Server, this is the fastest way to resolve this problem and removes the vulnerability completely. From there you can update any plugins as vendors release new versions.
… Read the rest

STRRAT Malware Is At It Again
A recent post from the Microsoft Security Intelligence revealed that STRRAT Malware is at it again with a new version release. The STRRAT malware is an odd duck to say the least. This STRRAT Malware is a Java-based RAT that poses as ransomware. It changes the file names on the infected devices by appending the “.crimson” extension without actually encrypting the files.
About STRRAT
The STRRAT Malware is actively distributing itself through a phishing campaign which includes a malicious attachment. Downloading this attachment will allow the malware to connect with the server to download the payload onto your computer. Once the payload is injected onto the computer the malware will start stealing data like passwords and installs keylogging software. It will also run remote commands and PowerShell, and executes other activities though it’s backdoor access. On top of it all the malware will also start renaming files and making them … Read the rest

How to install Primavera P6 EPPM v20 Server and Client
In this tutorial you will be shown how to install Oracle Primavera P6 EPPM v20. We will start with server installation and then end with a working client installation.
Prerequisites
The following prerequisites are a must to be configured and available.
- Windows Server 2019
- Microsoft SQL Server 2019 Express
- Microsoft SQL Server Management Studio (SSMS)
- Windows 10 Workstation
Let’s Get Started With Server Installation
- Decide which server you want to use.
- If its a new server download and configure Windows Server 2019 and make sure its fully updated.
- Download and Install Microsoft SQL Server 2019 Express. On the server and use the basic installation.
- Download and install SQL Server Management Studio (SSMS) on the server.
- Log into the Oracle Account
- Go to your downloads section and search for Primavera. During the creation of this tutorial the latest is 20.12 that was used. Download all the packages.
- Transfer the file