Information Technology & Security

Since the mid-1990s, I’ve worked with many individuals and organizations and bringing them technology solutions to issues they face. This has ranged from one-on-one individual tutoring to analysis, design, and implementation of organization-wide technology plans.

Technology is a tool to facilitate your work and your life. I tailor options to your needs and budget without sacrificing reliability or functionality.

I became a Microsoft Certified Systems Engineer (MCSE) in 2001 shortly after joining the Saint Louis Symphony and have steadily added many platforms and systems since then including:

  • Microsoft Windows NT4–10 as well as Windows Server NT4–2022
  • Microsoft Exchange 5.5, 2000, 2003
  • Apple Macintosh / OS X / macOS from System 7 through Sequoia (15), including Mac OS X Server
  • Microsoft Office for Windows and Mac (versions from the mid-1990s through present)
  • Google Workspace (formerly GSuite and Google Apps) for Business and for Education
  • VMware vSphere server virtualization
  • Firewall / IPS selection, deployment and administration
  • Website and Internet domain name management
  • Disaster Recovery planning and testing

Protecting systems and data has always been part of my work. What was once scanning floppy disks for viruses has become defense-in-depth with layers of protection, filters, access controls, traffic and log monitoring, automated alerting, password management, and change and patch management. Information security encompasses all these areas along with risk management, physical security, and business continuity and disaster recovery planning because the best firewall in the world doesn’t help if your server room floods or a contractor copies your database to a flash drive or has inappropriate network access.

In 2016, I studied for and passed the CISSP exam to broaden and systematize my information security knowledge. I followed this by learning about security assessment tools in a more hands-on fashion, receiving CompTIA’s Pentest+ certification in 2022.

My focus is making sure individuals and organizations take advantage of often built-in, free, or low cost options to use their technology in a safe way in real world conditions. I include educating others about threats and what they can do to protect themselves because information security isn’t about fear; it’s about being ready with tools and knowledge.

It may be impossible to shield a system from a targeted attack or government-based hacking or surveillance, but no one need fall victim to ransomware or email phishing schemes if they follow some basic strategies. (See the 4 Horizons blog for more essential tips.)