
Adam Bertram | | IT Insights | Security
The Windows registry can be a goldmine for attackers and clueless employees. There’s no place better suited for introducing security vulnerabilities or completely screwing up a Windows system than the registry.
Greg Mooney | | Security
The Gramm-Leach-Bliley Act (GLBA) has been around since 1999, but it doesn't just affect financial services, it also requires higher education to comply.
In this tutorial, you’re going to learn how to get started with GitHub Actions by creating an Actions workflow to invoke tasks in a job.
If you work in IT, or if you're in any position to evaluate and choose IT tools, chances are you're familiar with the names Gartner and Forrester.
Greg Mooney | | File Transfer | Security
The latest news and lockdowns around the world may seem drastic to some managers, but the reality is that working from home is the future for all office workers.
Greg Mooney | | Security
Businesses must consider all the data security implications when dealing with eWaste. Many companies are now opting to shred old equipment on top of using tools to wipe storage devices.
Michael O'Dwyer | | IT Insights | Security
Call it Identity Management (IDM), Identity Access Management (IdAM), or even IAM; IT is responsible for its implementation and ongoing maintenance.
Greg Mooney | | Security
In this article, we discuss what the HIPAA Omnibus Rule is and how it relates to HIPAA and HITECH.
Greg Mooney | | File Transfer | Security
At its simplest, File Transfer Protocol (FTP) is a rudimentary method of moving files from one location on a network to another.
Azure Bastion can best be described as a managed jump host. A jump host, also called a jump box, is a virtual machine that's placed on a virtual network. This article describes how to get started with Azure Bastion.
In cloud computing generally and in Microsoft Azure specifically, the shared responsibility model means that both Microsoft and you (the customer) have a role to play in ensuring service high availability.
Michael O'Dwyer | | IT Insights
Disclaimer: This post should not be used to determine your CCPA obligations and does not offer legal advice. It is designed to inform, raise some questions and lead you to investigate further by consulting with attorneys with relevant experience in data privacy laws and...
In this article, I’m going to show you how you can build an entire Azure lab setup with a single line of PowerShell.
Greg Mooney | | Security
This article provides the detailed features comparison needed when the need for file transfer moves from occasional to operational.
The Health Insurance Portability and Accountability Act (HIPAA) was introduced in 1996, and compliance was (and indeed is) necessary for all U.S. healthcare organizations.
Tim Warner | | Cloud | IT Insights
In today's tutorial, I'll teach you how to get started with Azure Firewall, Microsoft's cloud-native managed firewall appliance. Call it firewall-as-a-service if you'd like. Let's begin!
Shadow IT usually is the crux of IT teams. It creates an issue of visibility within the IT stack that leaves IT in the dark. But maybe that's not the whole story?
Greg Mooney | | Cloud | Security
For years, security concerns kept many business leaders convinced it was too risky to migrate the IT environment to the cloud. But in recent years, there’s been a shift.
This article will stick to the American usage — but remember that if you are operating globally, the terminology can get confusing.
Adam Bertram | | Security
In this article, you’re going to learn how to get free SSL certificates from the Let’s Encrypt CA. We’ll also touch on how to make sure that the website is being served strictly using HTTPS and confirm that the right SSL certificate is in use.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.