Podcast: How IT Can Enable a Remote Workforce
Greg Mooney | | Security
Jason Rader from Insight Enterprises discusses the challenges IT teams are facing during the pandemic, such as Shadow IT and data security issues.
Greg Mooney | | Security
Jason Rader from Insight Enterprises discusses the challenges IT teams are facing during the pandemic, such as Shadow IT and data security issues.
Online shoppers are often encouraged to ensure that their chosen online stores are 'secure', that the 's' in HTTPS is visible, and that the web browser displays a lock symbol. Propagating these visible indicators as confirmation of website security is not only...
The Dark Triad brings together three types of online cyber attacks: hacking, misinformation, and trolling. While they can each work independently, they usually feed off each other and become especially potent when working in concert.
Greg Mooney | | Security
With entire workforces and student bodies at all levels of education now logging in from home, deploying Single Sign-On and Multi-factor Authentication is as important as ever.
Adam Bertram | | IT Insights | Security
The Windows registry can be a goldmine for attackers and clueless employees. There’s no place better suited for introducing security vulnerabilities or completely screwing up a Windows system than the registry.
Greg Mooney | | Security
The Gramm-Leach-Bliley Act (GLBA) has been around since 1999, but it doesn't just affect financial services, it also requires higher education to comply.
Greg Mooney | | File Transfer | Security
The latest news and lockdowns around the world may seem drastic to some managers, but the reality is that working from home is the future for all office workers.
Greg Mooney | | Security
Businesses must consider all the data security implications when dealing with eWaste. Many companies are now opting to shred old equipment on top of using tools to wipe storage devices.
Greg Mooney | | Security
In this article, we discuss what the HIPAA Omnibus Rule is and how it relates to HIPAA and HITECH.
Michael O'Dwyer | | IT Insights | Security
Call it Identity Management (IDM), Identity Access Management (IdAM), or even IAM; IT is responsible for its implementation and ongoing maintenance.
Greg Mooney | | File Transfer | Security
At its simplest, File Transfer Protocol (FTP) is a rudimentary method of moving files from one location on a network to another.
Greg Mooney | | Security
This article provides the detailed features comparison needed when the need for file transfer moves from occasional to operational.
The Health Insurance Portability and Accountability Act (HIPAA) was introduced in 1996, and compliance was (and indeed is) necessary for all U.S. healthcare organizations.
Greg Mooney | | Cloud | Security
For years, security concerns kept many business leaders convinced it was too risky to migrate the IT environment to the cloud. But in recent years, there’s been a shift.
This article will stick to the American usage — but remember that if you are operating globally, the terminology can get confusing.
Adam Bertram | | Security
In this article, you’re going to learn how to get free SSL certificates from the Let’s Encrypt CA. We’ll also touch on how to make sure that the website is being served strictly using HTTPS and confirm that the right SSL certificate is in use.
Greg Mooney | | Security
Updated most recently in 2014, FISMA defines a framework to defend information, operations, and digital assets against natural disasters and man-made cyber threats.
Michael O'Dwyer | | File Transfer | Security
No. Fastest completion time ever OR maybe we need to go into more detail? Okay, to explain my conclusion, I need to go back to the origins of both protocols.
Greg Mooney | | Security
Whether it's your Marketing, Sales, or Finance team, employees are always trying to get work done as quickly as possible.
June Castillote | | IT Insights | Security
When an Exchange organization is made available for external and internal access, the proper SSL certificate must be installed on the server.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.