Greg Mooney | | Security
Nobody likes to be audited. It’s invasive and unpleasant, but being prepared for it can make the process much easier.
Today marks the 18th Sysadmin day since it was first founded by Ted Kekatos on July 28th, 2000. In honor of Sysadmin day—and the daily struggle of all IT Professionals, we present to you the Sysadmin Survival Guide, a collection of the best sysadmin resources from here...
Basic details of your computer like operating system and version, memory, network adapter and hard drive are never stored in one central location. You always have to go clicking around for it. But if you've got Python installed, we can build a script that collects all of...
Julianna Bernardi | | Security
If you work in IT for a regulated industry, security is one of your top priorities. Especially when working for the government, healthcare or finance, it is extremely important that products and services adhere to government-approved security requirements to ensure that...
Greg Mooney | | Security
External file transfers of digital assets are risky for everyone—no matter if you’re a healthcare organization, financial institution, insurance company, retail store, manufacturer or in education.
Functions are a common occurrence in PowerShell and to truly understand the PowerShell language, it's important that you know how functions work. In this article, we're going to show how a PowerShell function evolves from basically nothing all the way to having...
Greg Mooney | | Security
In this episode of Defrag This, we discuss the repercussions the new California Consumer Privacy Act will have on US data privacy laws and how and if it relates to the GDPR.
Dan Franciscus | | IT Insights
Knowing what software is installed on your desktops and servers is crucial in an organization. This is common sense to sysadmins. We like to know information such as installation date, version and who installed it. By default, in Windows, you can get some of this...
SaltStack/Salt is a configuration management (CM) and orchestration tool that enables system administrators to automate server provisioning and management tasks. Salt is comparatively a newcomer in the CM segment as it was launched in 2011, at a time when Puppet and Chef...
In your efforts to secure critical business and personal data, don't forget your file transfer and data sharing systems. One often overlooked area that can leave you vulnerable to cyber attack are outdated or under-managed FTP servers.
If you're not already familiar with scriptblocks, after reading this article, you'll begin to see them all over the place in PowerShell in the form of an opening and a closing curly brace.
Virtualization creates virtual resources that can be used the same way as any physical resource or application. Disk drive partitioning is a familiar form of virtualization. Servers, networks, desktops, applications, and storage can all be virtual.
Dan Franciscus | | IT Insights
In this article, I will discuss some of the ways to configure virtual machines using Vagrant networking.
If you’re in IT, chances are you’ve automated some task before. Whether it’s writing a script, building an application yourself or leveraging an off-the-shelf solution from a vendor; you’ve automated.
Open source is cool. But when it comes to FTP client solutions, it may be hip to be square. Here's why proprietary software might be best for your company.
Dan Franciscus | | IT Insights
In this article, I will point out five commands that every Vagrant user needs to know.
CIOs, CISOs, data protection officers and compliance managers who work for businesses that interact with citizens in the European Union (EU) now need to be on-guard. The countdown for the General Data Protection Regulation (GDPR), which went into effect May 25, is over.
After spending years as a far-off date on CIO calendars, GDPR is finally here. The General Data Protection Regulation applies to all organizations that process the personal data of EU residents, even if the organization itself is based outside of the EU. The penalties...
Rather than dive into the Managed File Transfer (MFT) VS. Enterprise File Sync and Share (EFSS) debate, I want to talk about a critical distinguishing characteristic of any file transfersolution, be it of either strain. This characteristic is the Service Level Agreement...
Greg Mooney | | Security
So you decided that they want to pursue a career in information security. Of course, the first thought may be to go to school or study to pass certification exams such as Security+, CISSP, or CEH. However, there is an increasing argument that you can’t just walk right...
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.