<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Posted on 02.01.19 by Jeff Edwards

Podcast - 12 Years Later: How the TJX Hack Changed Security and Compliance

In this episode of Defrag This, we’re taking a look back at one of the most monumental events in hacker history—the 2007 hack of TJX companies, which was, at the time, the biggest breach of consumer data in the history of the United States.

Posted on 02.01.19 by Dan Franciscus

Using Multiple Package Repositories with Chocolatey

On any given Chocolatey client, packages are going to be installed primarily from a remote repository. Although you can actually install a package located on your local machine, centralizing usually makes much more sense from a design standpoint. This remote repository...

Posted on 01.31.19 by Jeff Edwards

Podcast: The State of Brexit and the GDPR in 2019

With Brexit in limbo and the GDPR already handing out fines to companies in noncompliance, companies who work in the confines of the EU and UK are left with few details as to how to navigate the minefield that is compliance.  To help, we talked to a lawyer who is an...

Posted on 01.31.19 by Michael O'Dwyer

How to Easily Monitor Bandwidth Usage Per Device

Below is an excerpt from our WhatsUp Gold Network monitoring blog, in which we describe what bandwidth is, and how you can easily monitor bandwidth by usage, device, IP address, and more. 

Posted on 01.29.19 by Dan Franciscus

Installing Duo 2FA for Windows Log-on and RDP

Two-factor authentication is currently one of the best security practices for protecting users, data and systems. Duo is one of the leading platforms for using two-factor authentication in the enterprise as it protects many common on-premises and cloud applications by...

Posted on 01.25.19 by Greg Mooney

Podcast: State of Data Security in 2019

It’s hard to say if things are looking up or down for data security. It seems that companies across all industries are making a point to secure all their data in the wake of the massive data breaches of the past few years.

Posted on 01.23.19 by Adam Bertram

How to Use Tags in a PowerShell Pester Test

One of Pester’s useful features is the Tags feature. A tag allows a developer to organize their tests based on different criteria and execute those tests accordingly. Tags allow a developer to manage large test suites that may take hours to run by only executing certain...

Posted on 01.22.19 by Michael O'Dwyer

Does the US Need a Constitutional Amendment for Data Privacy?

Data privacy seems to have surpassed all other technological buzzwords (with Big Data, AI and IoT largely responsible for the increase in available data) in the last few years, primarily because of the number of data breaches, which continues to rise unabated each year.

Posted on 01.17.19 by Joe Hewitson

Managing the Stress in IT: A Sysadmin's Perspective

Unfortunately, stress is an inevitable aspect of any job. Deadlines start piling up, resources are stretched thin and before you know it, your cholesterol levels read more like a lopsided basketball game than a healthy screening. For sysadmins, managing the stress in IT...

Posted on 01.16.19 by Jacqueline Lee

What Is A+ Certification? Your Ticket to an A+ Resume

There's a truth that people applying for IT jobs need to keep in mind: most recruiters know next to nothing about IT. You'll get a blank stare when you ask them, "What is A+ certification?"

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.