If you wish to hire me for a future project (check out approximate pricing for writing/editing) or wish to suggest a discussion topic for a future post, go ahead. I will respond promptly.
Unfortunately, all cold callers offering products and services will go unanswered. In addition, I am not seeking guest posts or prepared to act as a submission partner or editorial contact for other sites.
As Seen On:
For my part, I will not seek your contact information for future mailing lists, beg for shares on social media or introduce annoying popups selling courses and other items designed to extract money from fellow writers. I have another site to handle business activities. All I’m seeking is work with ethical rates (yes, I said it), intelligent discussion and readers.
You are of course welcome to support my writing if you enjoy it. Future revisions of posts on the site will include a signature with multiple options to buy me a coffee, subscribe or donate. My family and I thank you in advance.
My Portfolio
A sample of my credited portfolio is shown below. You can search by keyword or topic if necessary, given that there are more than 200 entries. Note that some older entries are unavailable as companies change or archive their sites. If you find one that’s no longer active, let me know and I’ll send you a screen capture from my internally managed portfolio.

Owner
My Portfolio
Listly by Michael O'Dwyer
A selection of stories published to date.
Mark Zuckerberg is still pushing for the creation of Libra, but it's obviously futile for him at this point. He knows we don't trust Facebook.

In the span of just one minute, the downtime costs from the interruption of mission-critical applications can rise to $10,000. Think then about what an
Moving legacy applications to the cloud can increase performance and enhance daily operations, but what do you need to know about the transition?
But, where do you start? How do you identify potential security threats?
How much customers care about data breaches is often dependent on the type of customer data obtained by attackers.
I’d like to believe that all readers will use this post to prepare for a ‘what if’ scenario but the sad truth is that some of you are reacting to a data breach and lack an incident response plan.
What are the risks of Shadow IT? How can they be reduced?
Secure Socket Layer (SSL) or Transport Layer Security (TLS) refer to security technologies that encrypt data sent between a web server and web browser.
As IT pros, we’ve been aware for quite some time that some users are a threat to security.
If you are a small or medium business, you may have left your data backups in the hands of outside help or, even worse, to chance.
Two years plus and counting and companies are still being impacted by WannaCry. Here are the four main reasons why an old exploit and ransomware is still an issue.
Why is the GNFA relevant? What are the benefits to companies and to certified GNFA professionals?
Given the number of possible ports, how can network administrators handle a monitoring process or even detect an intrusion?

In many jurisdictions, there is a legislative or accounting requirement to store data for a minimum of five years. Easier said than done. That's why multiple data backups are necessary.
How can companies ensure adequate protection of physical and digital files? What are the common attack vectors involved? Does your security policy consider remote and onsite attacks?
Facebook is determined to launch their own digital currency called Libra, but why would anyone trust them at this point?
Azure App Insights will handle public, private and hybrid clouds only. WhatsUp Gold offers an alternative that allows monitoring of the Azure environment and the entire local area network.
It’s fair to observe that Bluetooth has its issues and security vulnerabilities are now being exploited by hackers seeking access to data.

Both Azure and AWS offer a variety of cloud offerings. But why is Azure gaining momentum over AWS?
What is the ideal way to ensure reliable yet prompt update installation? In a traditional office environment, is it practical to supervise individual installs? Can we rely on all updates or will they cause additional problems?
Since encryption is used to secure data, it would seem only natural that encrypting something twice would increase security. That isn't always the case.
Should businesses be worried about Huawei or is this really just hysteria and a political agenda that is sending shockwaves around the world?
Over the past few years, Slack has risen to be the largest collaboration tool to help teams stay on track. In this article, I will discuss how it works.

The use of big data by enterprises is almost commonplace at this point, with advocates claiming it aids decision-making, increases revenue and productivity and decreases operational costs. But it comes at a cost to data privacy.

For years, security pros have emphasised the need for different passwords, as identical passwords make it way too easy for hackers.
Recent Comments