IcePhishHacker
From the Mind of a Lone IT Professional

Latest

05
Jun
Day 9.0 - Here Phishy, Phishy, Phishy....

Day 9.0 - Here Phishy, Phishy, Phishy....

🎣 Why Tailoring Phishing Simulations to Your Business Matters Phishing simulations are a cornerstone of modern cybersecurity training, but many organizations
2 min read
04
Jun
Day 8.0 - "The Never-Ending Ticket Tsunami: A Day in the Life of a Help Desk"

Day 8.0 - "The Never-Ending Ticket Tsunami: A Day in the Life of a Help Desk"

There’s a certain rhythm to a normal help desk day — a few password resets in the morning, a printer
2 min read
03
Jun
Day 7.0 - Why Security Training and Phishing Simulations Matter - And Why It Pays to Switch Providers

Day 7.0 - Why Security Training and Phishing Simulations Matter - And Why It Pays to Switch Providers

In today’s threat landscape, phishing remains the #1 cause of data breaches. No matter how robust your firewall is
2 min read
28
May
Day 6.0 - 📘 Streamlining Help Desk Categories: Migrating from SysAid’s 3-Tier to iTop’s ITIL-Aligned 2-Tier Structure

Day 6.0 - 📘 Streamlining Help Desk Categories: Migrating from SysAid’s 3-Tier to iTop’s ITIL-Aligned 2-Tier Structure

As organizations mature their IT operations, shifting from traditional ticketing systems to ITIL-aligned platforms becomes critical for better service management,
2 min read
27
May
Day 5.0 - Out with the old and in with the new.

Day 5.0 - Out with the old and in with the new.

Retiring Our Legacy SysAid Helpdesk and Embracing a Modern iTop Service Desk After years of faithful service, we’ve officially
2 min read
24
May
Day 4.0 - The Grind Behind the Screen – A Day in the Life of IT Ops

Day 4.0 - The Grind Behind the Screen – A Day in the Life of IT Ops

Some days in IT are a whirlwind of unexpected outages, broken printers, and "why can't I connect
2 min read
23
May
Day 3.0 - 🚀 Using Ansible to Streamline Your Microsoft Windows Deployment

Day 3.0 - 🚀 Using Ansible to Streamline Your Microsoft Windows Deployment

Deploying Microsoft Windows at scale can be a complex task, especially when dealing with multiple systems, configurations, and post-installation setups.
2 min read
22
May
Day 2.0 - Understanding Remediation and Mitigation After a Network Vulnerability Scan

Day 2.0 - Understanding Remediation and Mitigation After a Network Vulnerability Scan

In today’s cybersecurity landscape, conducting regular network vulnerability scans is a crucial step toward protecting your organization from threats.
2 min read
21
May
Day 1.0 - Automating Software Installs for 30 New Computers: A Sysadmin's Guide

Day 1.0 - Automating Software Installs for 30 New Computers: A Sysadmin's Guide

As an IT admin, managing multiple systems simultaneously can be overwhelming—especially when you’re setting up 30 new computers
3 min read
20
May
Day 0.0 - Welcome to the Grind

Day 0.0 - Welcome to the Grind

Who Am I? I'm an IT Administrator who wears all the hats—help desk, sysadmin, network admin, cybersecurity
1 min read