My Blog

Articles about cybersecurity, ethical hacking, networking, operations, and secure programming.

How I Work with Printers and Document Management So Daily Work Flows Better and Administration Decreases
IT Support & Administration

How I Work with Printers and Document Management So Daily Work Flows Better and Administration Decreases

Printers and document handling may not be the first things many people think of when IT is discussed. But in everyday work they are often an important part of how things ...

How I Work with Backup and Recovery So the Company Stands Safer When Something Happens
IT Operations & Infrastructure

How I Work with Backup and Recovery So the Company Stands Safer When Something Happens

For me, backup is not just a technical function running in the background. It is an important part of the safety of the whole IT environment. As long as everything works...

How I Work with Microsoft 365 So It Truly Simplifies Daily Work
Microsoft 365 & Cloud

How I Work with Microsoft 365 So It Truly Simplifies Daily Work

Microsoft 365 is one of those platforms that many companies already use, but far from all of them use it in a way that truly helps daily work. It is easy to just “have it...

Learning Resources – Cybersecurity, Ethical Hacking & Networking
Learning Resources

Learning Resources – Cybersecurity, Ethical Hacking & Networking

Cybersecurity is a field that constantly evolves. New technologies appear, systems grow more complex, and new threats emerge. Because of this, learning never really stops...

How I Work with Network Documentation and Structure So Troubleshooting Is Faster and the Environment Is Easier to Manage
IT Operations & Infrastructure

How I Work with Network Documentation and Structure So Troubleshooting Is Faster and the Environment Is Easier to Manage

When a network works well, people barely notice it. People do their work, systems respond, and the day moves forward. But when something starts to fail, it becomes obviou...

How I Work with Applications, OT/IoT, and Physical Security When the Attack Surface Is Broad and the Demand for Realism Is High
Security & Testing

How I Work with Applications, OT/IoT, and Physical Security When the Attack Surface Is Broad and the Demand for Realism Is High

When I think about penetration testing, I do not think only about servers and firewalls. Many of the most important risks are found in the parts closest to the actual bus...

How I Work with External, Internal, and Assume-Breach Testing to Show How an Attacker Can Get In and Move Further
Security & Testing

How I Work with External, Internal, and Assume-Breach Testing to Show How an Attacker Can Get In and Move Further

When I work with penetration testing, I think it is important not to get stuck in only one part of the attack surface. An attacker rarely thinks in isolated silos. That i...

How I Perform a Penetration Test So the Customer Gets a Realistic Risk Picture, Clear Evidence, and Actions That Can Be Carried Out
Security & Testing

How I Perform a Penetration Test So the Customer Gets a Realistic Risk Picture, Clear Evidence, and Actions That Can Be Carried Out

For me, a penetration test is not a quick technical check and not just a list of possible weaknesses that gets handed over without context. A strong penetration test shou...

How I Work with Networks, Firewalls, Logs, Risk Assessment, Reporting, and Follow-Up So Security Leads to Real Improvement
Security & Testing

How I Work with Networks, Firewalls, Logs, Risk Assessment, Reporting, and Follow-Up So Security Leads to Real Improvement

For me, a great deal of cybersecurity work begins in the parts of the environment that many organizations depend on every day but may not think much about until something...

How I Perform a Penetration Test So the Customer Gets Evidence, Understanding, and Clear Next Steps
Security & Testing

How I Perform a Penetration Test So the Customer Gets Evidence, Understanding, and Clear Next Steps

When I think about a penetration test, I do not first think about “hacking something.” I think about giving the customer a realistic picture of what an attacker could act...

How I Work with Server Operations and Hosting So Companies Get High Availability Without Unnecessary Administration
IT Operations & Infrastructure

How I Work with Server Operations and Hosting So Companies Get High Availability Without Unnecessary Administration

For me, server operations and hosting are not primarily about technology for its own sake. They are about companies being able to work without having to think about what ...

How I Work with IT Asset Inventory and Lifecycle Management So Nothing Is Forgotten and Purchases Are Easier to Plan
IT Support & Administration

How I Work with IT Asset Inventory and Lifecycle Management So Nothing Is Forgotten and Purchases Are Easier to Plan

When people think about IT, they often think first about support, networks, servers, and security. But one area that makes a big difference in everyday work—and is often ...

How I Work with Operational Monitoring So Problems Are Discovered Before They Disrupt the Business
IT Operations & Infrastructure

How I Work with Operational Monitoring So Problems Are Discovered Before They Disrupt the Business

For me, good IT is not only about solving issues when they happen. It is also about noticing the signals before the issue has become a real problem. That is where operati...

How I Work with Onboarding and Offboarding So Users Get a Good Start and a Safe Ending
IT Support & Administration

How I Work with Onboarding and Offboarding So Users Get a Good Start and a Safe Ending

When people talk about IT, they often think about networks, support, security, and systems. But one area that matters much more than many people realize is how users are ...

How I Work with Documentation and Order in the IT Environment So Nothing Falls Through the Cracks
IT Support & Administration

How I Work with Documentation and Order in the IT Environment So Nothing Falls Through the Cracks

When people talk about IT, they often think first about networks, computers, servers, security, and support. That is understandable. Those are often the parts that are mo...

How I Work with IT Support So Users Feel Safe and Get Fast Help
IT Support & Administration

How I Work with IT Support So Users Feel Safe and Get Fast Help

For me, IT support is much more than simply resolving technical issues. It is also about how the help feels to the person who needs it. When someone contacts support, so...

How I Work with IT Security for Companies Without Making It Complicated
Security & Testing

How I Work with IT Security for Companies Without Making It Complicated

When people hear the phrase IT security, they often think immediately about attacks, advanced tools, and difficult technical language. I understand that. Security can eas...

How I Work with Networks and Operations So the Customer Has Fewer Daily Interruptions
IT Operations & Infrastructure

How I Work with Networks and Operations So the Customer Has Fewer Daily Interruptions

For me, good IT is not only about solving problems after they appear. It is just as much about reducing how often those problems appear in the first place. That is where ...

How I Work as a Reliable External IT Department
IT Support & Administration

How I Work as a Reliable External IT Department

For me, IT is not only about computers, networks, and systems. It is about helping people work without unnecessary interruptions. When IT works well, it is barely noticed...

How I Set Up a Business Network – From the First Meeting to Stable Operations
IT Operations & Infrastructure

How I Set Up a Business Network – From the First Meeting to Stable Operations

When I set up a company network, I never start by simply plugging in equipment and hoping everything will work. I start by understanding the business. For me, that is the...