
Dan Franciscus | | IT Insights
On any given Chocolatey client, packages are going to be installed primarily from a remote repository. Although you can actually install a package located on your local machine, centralizing usually makes much more sense from a design standpoint. This remote repository...
Jeff Edwards | | Security
In this episode of Defrag This, we’re taking a look back at one of the most monumental events in hacker history—the 2007 hack of TJX companies, which was, at the time, the biggest breach of consumer data in the history of the United States.
Dan Franciscus | | IT Insights | Security
Two-factor authentication is currently one of the best security practices for protecting users, data and systems. Duo is one of the leading platforms for using two-factor authentication in the enterprise as it protects many common on-premises and cloud applications by...
Adam Bertram | | Automation | IT Insights
One of Pester’s useful features is the Tags feature. A tag allows a developer to organize their tests based on different criteria and execute those tests accordingly. Tags allow a developer to manage large test suites that may take hours to run by only executing certain...
Unfortunately, stress is an inevitable aspect of any IT job. Deadlines start piling up, resources are stretched thin and before you know it, your cholesterol levels read more like a lopsided basketball game than a healthy screening. For sysadmins, managing the stress in...
Jacqueline Lee | | IT Insights
There's a truth that people applying for IT jobs need to keep in mind: most recruiters know next to nothing about IT. You'll get a blank stare when you ask them, "What is A+ certification?"
Dan Franciscus | | IT Insights
Chances are if you are managing servers in an organization, you have also had a lot of experience managing SSL certificates. Practically any web server should be communicating over HTTPS to clients if you want to make it secure, which means you have to deploy an SSL...
Creating excellent PowerShell scripts is one thing, but sharing them with others takes them to a whole new level! One of the best ways to improve your PowerShell skills, share your scripts with the community, and make your work known is by publishing scripts to the ...
Adam Bertram | | Cloud | IT Insights
Lab environments are essential to lots of people in IT, including system administrators needing to test out the latest software or software developers needing to deploy their own custom software to test before rolling it out to production.
Jeff Edwards | | Cloud | IT Insights
We're excited to announce that MOVEit Automation can now access Amazon S3 (Simple Storage Service) buckets as native hosts!
In Azure automation, there exists a useful feature called Variables. Variables are assets in Azure Automation that allow you to set and query various values.
Jeff Edwards | | Cloud | IT Insights
One of the main goals of MOVEit Managed File Transfer, and Ipswitch as a whole, has been to help IT teams work more efficiently.
Here is a quick and easy way to remotely log off end users who are still logged into their computers. This is especially useful when you are trying to do maintenance.
Greg Mooney | | Cloud | Security
Too many IT professionals believe that companies that provide cloud platforms and services, such as AWS or Google Cloud, handle all the cloud-related security. Considering how much business transpires in the cloud, this is a dangerous assumption to make.
Jeff Edwards | | Security
Today, the world's largest hotel chain, Marriott International, disclosed what may be turn out to be one of the largest data breaches in history.
Greg Mooney | | Security
It’s the proverbial 1,000-pound gorilla—a compliance violation. Perhaps you haven’t seen one yet, but you know it’s out there lurking, and it just might come banging on your door any day now.
Jeff Edwards | | Security
If 2017 was the year of the ransomware attack, then 2018, insofar as it can be defined by malware, was the year of cryptojacking.
Michael O'Dwyer | | IT Insights
In the computing world, virtualization by way of virtual machines is used to describe a method of avoiding the purchase of multiple physical computers or servers, one for each operating system.
Dan Franciscus | | IT Insights
While it supports Windows and Linux, creating an OS image is vastly different between the two. In this article, I will focus on how Packer is used for Windows OS image creation.
Jeff Edwards | | File Transfer | Security
Collaboration is of utmost importance in the modern workplace, but when done incorrectly, a collaborative environment can also be an insecure one. Here's how you can allow increased workplace collaboration, without reducing security.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.