<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Posted on 09.04.19 by Mark Towler

End User Access Should Not Be Binary

In our computerized world, things tend to be reduced to binary as often as possible. 1 or 0. On or Off. Positive or Negative. Access Granted or Access Denied. That shouldn't always be the case.

Posted on 09.03.19 by Dan Franciscus

Measuring Reboot Time with PowerShell

In enterprise environments, you will usually find an array of different Windows operating systems, hardware and of course software. Typically, machines are managed and configured with group policy and SCCM, or perhaps other more modern methods like Chef or Puppet. One of...

Posted on 08.29.19 by Jeff Edwards

Why Auditable Access Controls Matter

By now, you should know that controlling access to sensitive files, devices, tools, and network areas is of utmost importance in cybersecurity, but you should also know that it’s not enough to simply control how users access resources. It’s equally important to be able...

Posted on 08.29.19 by Mark Towler

Passwords Don't Work: Multi-Factor Authentication is Essential

A month ago we told you how MFA (Multi-Factor Authentication) is an essential part of your encryption strategy. This month we’re letting someone else tell you the same thing for even more confirmation.

Posted on 08.28.19 by Greg Mooney

APIs Provide the Data Access Windows for Improving Healthcare

APIs are becoming a huge part of how healthcare organizations provide better care to patients. But what about the security concerns with APIs?

Posted on 08.27.19 by Greg Mooney

Top IT Security Certifications to Elevate Your Career

Nobody does IT security better than you and your InfoSec team. You developed a strategic plan that prevents most breaches, and for those that do slip by your perimeter defenses, you have a great tactical plan to identify and mitigate attacks as quickly as possible....

Posted on 08.20.19 by Mark Towler

Enforcing Security Policy Agreement at Sign On with MOVEit

Security policies are prone to change, and you need to keep your users up-to-date on those changes so that they won't violate the terms of the policy, but doing so is often easier said than done.  

Posted on 08.20.19 by Sherwood Stranieri

Global Data Privacy Laws: US, EU, China and More

In the 2018-2020 timeframe, the rollout of GDPR in the EU is having an impact on companies worldwide, thanks to its legislative reach beyond the EU’s borders. But companies also have to content with a wave of new data privacy legislation in the US, UK, China, and many...

Posted on 08.19.19 by Dan Franciscus

Introduction To The New Windows Terminal

Recently at the Microsoft Build conference, it was announced that there is a new Windows terminal that can be used as an alternative to cmd of PowerShell, called Windows Terminal.

Posted on 08.16.19 by Jeff Edwards

Why Balancing Access Controls for Managed File Transfer Matters

If you're using secure file transfer tools, chances are you're security conscious. Maybe you're working in a highly-regulated industry, or perhaps you don't want your company on the front page of the newspaper for getting hacked. Whatever the case, if you're securing...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.