Mindgrove logo 

  About us
  Useful links
bullet point Tools and aids
  Contact us

Tools and aids


If you find a broken link, please help us and others by sending us an email to let us know which link is broken. We check links regularly, but many of the links on this page are to external web sites and we have no control over changes made to them.




These guides and references are intended for auditors that need to understand more about technology and IT.

Technical Acronyms Lookup

Wonder what that technical acronym means? You'll find it here!


Understanding how to create more complex queries and import the results into Excel.

Mobile Device and Wireless Security (pdf download 866KB)

This substantial paper is intended for those that wish to find out more about wireless, bluetooth, PDA and storage card security and control.Learn more about the risks associated with these technologies and use our free 24 point checklist to help reduce your exposure to these risks.




Computer Security and Insecurity

A TED lecture by Bruce Schneier - author of "Secrets and Lies". Why the feeling of security and reality do not always match.


Everyday Cybercrime

A TED lecture by James Lyne who reminds us that it's not only the NSA that's watching us, but ever-more-sophisticated cybercriminals, who exploit both weak code and trusting human nature.


Flying Quadcopters - the evolution of drones

Raffaello D'Andrea demos his flying quadcopters: robots that think like athletes, solving physical problems with algorithms that help them learn.


How to rob a bank - from the inside

William Black is a former bank regulator who’s seen firsthand how banking systems can be used to commit fraud — and how tricky tactics led to the 2008 US banking crisis that threatened the international economy. In this engaging talk, Black, now an academic, reveals the best way to rob a bank — from the inside.




These checklists, covering the critical risks associated with chosen topics, are intended as supplements to the work of audit, risk management and IT security professionals.

Routers - 10 Important Risks

This paper will extend your knowledge about router risks and controls – it will be most useful to auditors that specialise in technology.

Top 13 Project Risks

It turns out that thirteen is unlucky for projects too! Consult this list of frequently occurring risk issues to manage them before they manage you.

12 Top Contract Risks

This guide contains a lot of information about key contract risks.

Inventions and Ideas

Many organisations have to protect or patent their intellectual property – this guide helps focus on risks in this area


eCommerce Project Risk

Of course we are all going electronic, but eCommerce projects open up a new area of risks that need to be controlled in order to have a successful outcome.

Application Service Providers

We increasingly outsource our non-core business activities – but are we considering all of the risks?





Good and comprehensive inventory tool

The Centre for Internet Security (CIS)

Download (free) best practice benchmarks for operating systems, networks, applications and more.


Sam Spade

A free and useful network lookup tool that includes finding an IP address from a hostname, or vice-versa, traceroute, dig, email header analysis and more

Microsoft Security Tools

From Microsoft Security


Site that enables you to determine which hosting software is being run on that website


Top 125 Network Security Tools

Site that rates and describes the best network security tools - many are freeware

Password Recovery Resources

Tools to Recover Passwords

What's that process that's running in Windows?

Look-up processes that you see displayed in task manager and find out more about them


Which Windows System?

The Elder Geek - a huge searchable inventory of Windows knowledge


What's that UNIX process?

A useful repository of knowledge about common UNIX processes and programs



One of the best low cost forensic utilities for disk analysis

Windows DumpSec

Free reporting tool DumpSec (formerly known as DumpAcl) to create customisable audit reports from Windows systems




A comprehensive glossary of vulnerability testing terms from the Finnish University of OULU

Open Web Application Security Project
The Open Web Application Security Project (OWASP) is a worldwide free and open community focused on improving the security of application software - go here for free resources and advisories


Vulnerability Testing

Links to Qualys, GFI LanGuard and MetaSploit - all of which offer free trials of professional software for vulnerability testing



IS Modeler
Demonstration version of low cost Process Modelling Tool

Public Domain Spreadsheet Templates
Including IT Risk, Balanced Scorecard, general Risk Analysis




IT Security Policy Templates

A wide range of free ITSEC templates from SANS

Services guide to Windows XP

VoIP Internet Telephony

Free or low cost encrypted telephone calls, conference calls and real time chat around the world – SKYPE


Public Domain security software

A range of free security solutions for home users





Project Risk

A (customisable) template for evaluating project risk – created by MindGrove v5.0 2011 requires MS Word 2007 or later.




Microsoft Online


Microsoft Security Guidance - select link according to product or interest


Windows 2003 Server Security Guide - quicklink to Server 2003

Best practice: Windows Encrypting File System - quicklink to EFS



Cisco Online

Cisco searchable links - choose 'security' keyword under Option 1 to find guides and documentation



IBM Redbooks Online

Free and definitive books direct from IBM. Go to this portal to search, find and retrieve audit related materials on Database Security, AS/400 Security, RS/6000 Security, Linux Security, Lotus Security, i Series – pSeries – xSeries and zSeries, Security, S/390, Websphere, Tivoli Systems and more.


  Call us on +44 (0) 1925 730 200 Site map | Contact us  
© 2015 Mindgrove Ltd. All rights reserved