Nothing is perfect: but it never stops us striving to be, and do better.
Why does this blog exist?
In a world ruled and operated by tangible information - Humanity fails to understand the data they release into the world on a daily basis until its too late.
This blog exists to collate technical and non-technical sources of information, theories, and ideas around information security and its application to businesses and technology in the real world.
My name is Stephen and i'm currently based in the North-East of England, my current professional role is providing Managed IT services and designing solutions that go into place in a wide range of small and medium sized businesses. I have a keen interest in information security and its application to small and medium enterprises.
I started my professional life volunteering inside a local non-profit which had been exploited by external IT providers, fleeced by so called experts, and left in the lurch of service level agreements. Witness to these horrors organisations were put through, it became my personal mission to provide first-class, honest and ethical solutions to information problems. Over the last decade i've moved from volunteering 3500 hours of my personal time within a non-profit to supporting and developing over 75 organisations across the UK in a range of sectors from Charitable to Public sector.
On a personal level I have been interested in computing the majority of my life, working over a wide range of operating systems and using countless technologies, always adopting the latest and greatest with enthusiasm.
In terms of education I completed my A levels whilst volunteering and moved onto my BSc (Hons) degree in Business Information Technology, achieving a first class classification from Northumbria University; my final year project investigated the barriers to information security within small and medium enterprises.
I currently hold vendor certifications from Meraki, Watchguard, GFI, VASCO and AWS which I gained during the same time frame, my current personal development goals revolve around gaining the OSCP, CCNA and MCSA certifications.
Why do you matter?
This is just another blog from another information professional who has a keen interest in information security. I'm not here to please you, i'm here to offload my thoughts and experiences into a fluid medium - If i've helped you during this process - AWESOME. Feel free to provide feedback or question anything within this blog at any time.
All opinions, thoughts and ideas appearing on this blog do not represent the views of my current or former employers, vendors i represent or any organisations that i hold/have held membership of unless explicitly stated.