-
Dec 5, 2019, 00:00 AM
by
Jeff Edwards
There are lots of file transfer protocols to choose from, but one that’s rarely discussed in depth is AS2. In this article, we take a deeper look at AS2, how it stacks up against SFTP, and why you would choose one or the other.
Full story
-
Nov 27, 2019, 00:00 AM
by
Dan Franciscus
One of the best ways to protect your servers and workstations from malware is to limit the execution of untrusted files.
Full story
-
Nov 22, 2019, 00:00 AM
by
Jeff Edwards
Time and time again, retailers prove to be a popular (and easy) target for hackers. The tangible and intangible costs for an e-commerce site that’s been breached can escalate quickly. In this post, we'll explore the issue, and outline some solutions.
Full story
-
Nov 20, 2019, 00:00 AM
by
Michael O'Dwyer
Mark Zuckerberg is still pushing for the creation of Libra, but it's obviously futile for him at this point. He knows we don't trust Facebook.
Full story
-
Nov 19, 2019, 00:00 AM
by
Jeff Edwards
With the holiday’s right around the corner, it is time to give thanks for the people that are really important in your life—like your SysAdmin.
Full story
-
Nov 18, 2019, 00:00 AM
by
Tim Warner
Today I will teach you how to create what Microsoft calls a managed storage account. As you may know, each storage account has two interchangeable private keys you can use to authenticate programmatically to the general purpose storage account's four services:
Full story
-
Nov 15, 2019, 00:00 AM
by
Tim Warner
Azure Blueprints provide a "one-stop shop" for Azure governance. By implementing JSON templates and a controlled, unified workflow, Azure administrators can define, deploy, enforce, and maintain standardized Azure environments.
Full story
-
Nov 12, 2019, 00:00 AM
by
Tim Warner
In this post, PowerShell expert Tim Warner shows you how you can create a custom Azure Resource Role with PowerShell.
Full story
-
Nov 8, 2019, 00:00 AM
by
Jeff Edwards
If your business deals with credit card payments in any way, then PCI compliance is going to be a fact of life, and an essential part of running your business securely and efficiently. PCI compliance is a critically important step in protecting your customer's or...
Full story
-
Nov 6, 2019, 00:00 AM
by
Dan Franciscus
For many Microsoft IT professionals, one of the first things they do with PowerShell is using it to perform tasks in Active Directory.
Full story
-
Nov 1, 2019, 00:00 AM
by
Michael O'Dwyer
Secure Socket Layer (SSL) or Transport Layer Security (TLS) refer to security technologies that encrypt data sent between a web server and web browser.
Full story
-
Oct 31, 2019, 00:00 AM
by
Mike Kanakos
PowerShell provides two similar management interfaces for accessing data on a computer: WMI and CIM.
Full story
-
Oct 30, 2019, 00:00 AM
by
Dan Franciscus
In enterprise environments, you will usually find an array of different Windows operating systems, hardware and of course software. Typically, machines are managed and configured with group policy and SCCM, or perhaps other more modern methods like Chef or Puppet. One of...
Full story
-
Oct 29, 2019, 00:00 AM
by
Greg Mooney
In this podcast, we hear from a few IT experts about the worst IT nightmares they've ever encountered.
Full story
-
Oct 25, 2019, 00:00 AM
by
Greg Mooney
If your organization is finding it difficult to comply with PCI DSS, the Payment Card Industry Data Security Standard, it could be due to some of the misconceptions about the standard.
Full story
-
Oct 23, 2019, 00:00 AM
by
Dan Franciscus
In this article, Dan Franciscus covers how to use the Invoke-Command and why it is one of his favorite commands to use in PowerShell.
Full story
-
Oct 14, 2019, 00:00 AM
by
Jeff Edwards
The cloud is a fact of life in 2019. From basic cloud collaboration tools to storage buckets on massive cloud platforms like Azure and AWS, most businesses perform thousands of cloud file transfers every day, whether they’re aware of it or not. For businesses and IT...
Full story
-
Oct 12, 2019, 00:00 AM
by
Michael O'Dwyer
If you are a small or medium business, you may have left your data backups in the hands of outside help or, even worse, to chance.
Full story
-
Oct 9, 2019, 00:00 AM
by
Michael O'Dwyer
As IT pros, we’ve been aware for quite some time that some users are a threat to security, whether by their use of shadow IT, their susceptibility to social engineering attacks from cybercriminals, or by using their employee role and access permissions to compromise data...
Full story
-
Oct 4, 2019, 00:00 AM
by
Dan Franciscus
The process of securely installing software in Windows is something that IT professionals grapple with, especially in an enterprise setting.
Full story