Adam Bertram | | Security
In today's dangerous cyber environment, it's more important than ever to protect your data. Bad guys are always on the lookout for an easy score. As a sysadmin, it's one of your many jobs to set up security controls and make sure your network is not an easy target.
The spread of VoLTE and VoWiFi phones and services could spur cord-cutting by consumers and businesses. In 2013, the U.S. Centers for Disease Control and Prevention estimated that two out of every five American households had already cut their ties to landlines — and...
Greg Mooney | | Security
For IT managers in regulated industries, audits are a way of life. Proactive record keeping will be critical for when those pesky auditors walk through the front door. This is where a secure FTP (sFTP) tool can play a big role. In a post-Enron world, transparency is key...
Scripts are the meat and juice of system administrators. Being able to make use of an extensive set of scripts suitable for different tasks is essential for a sysadmin. But how do you actually do the script management?
Michael O'Dwyer | | IT Insights | Security
IT pros should not have to support users who lack basic IT skills. A bold statement, I know. But when network users display a complete absence of IT soft skills and common sense, even as security breaches become almost commonplace, they leave us with no choice.
Michael O'Dwyer | | IT Insights
For many, the future of virtual reality is of little concern — in work-related tasks at least — as most still tend (and prefer) to work in the real world.
Adam Bertram | | IT Insights | Security
How would you define a web server as being "up"? It doesn't just respond to a simple Internet Control Message Protocol (ICMP) echo request (ping). Even though this is a great indicator of a web server's operating system being online — and it being connected to the...
Encryption keys are considered the key to the kingdom, both from a server-, service- and user-oriented approach. One of the most popular solutions for encryption keys is GnuPG, an implementation of the OpenPGP standard for encrypting and signing data and communication....
Joe Hewitson | | Security
Communication, both within the enterprise and B2B, is the lifeline of business ops. As these communications transitioned from paper to electronic data, however, a new standard was required to ensure disparate systems could efficiently handle incoming content. Thus, EDI...
Not only is IT tasked with new technology deployments (which ultimately improve ROI), putting out fires when networks don't work properly and responding to service tickets from frustrated users, but they're often anchored to bland, run-of-the-mill workstations for most...
If you want your meetings to put everyone outside support to sleep, schedule a presentation on SSL vs. TLS. Or you can spell it out, Secure Socket Layer versus Transport Layer Security; or simply RTSNOWU, Really Technical Stuff No One Will Understand.
David Strom | | Security
Earlier this month, President Obama promulgated his Cybersecurity National Action Plan (CNAP) to try to bring alive some of the things mentioned in the Cybersecurity Act of 2015, which the U.S. Congress passed last December. It primarily encourages the private sector to...
Michael O'Dwyer | | IT Insights | Security
Often thought of as cmd.exe on steroids, Windows PowerShell is more than just a shell. Despite its name, it actually offers personalized scripting, advanced automation and productivity solutions for administrators and power users. Others are content with the standard...
Automated file transfer tools can quickly automate many common file transfer tasks by anyone on the IT team without any programming required. It also provides a single resource for central management and visibility of all...
David Lacey | | Security
In my last post I shared drivers and trends related to security and compliance, and as promised, this time I'll go deeper into HIPAA.
The hotshot developer your company just lost to a competitor could also be your biggest security risk from employee data theft. You shouldn't wait until he's left carrying a 1TB flash drive full of trade secrets to worry about what else may have just walked out the door.
Picture a rural health system sending large, high-res brain scans from a stroke patient to a city hospital for analysis. Now picture a field engineer sharing 3-D AutoCAD files of a new oil field with decision-makers at corporate. Imagine an enterprise migrating stored...
Even though some IT pros would rather have a root canal procedure over a compliance audit, these regular checks are necessary for midsize businesses to ensure each important standard is upheld.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.