<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Greg Mooney
Greg is a technologist and data geek with over 10 years in tech. He has worked in a variety of industries as an IT manager and software tester. Greg is an avid writer on everything IT related, from cyber security to troubleshooting.
Find me on:

Recent Posts

Posted on 03.05.20 by Greg Mooney

Podcast: Why Cyber Hygiene Is So Important

In this podcast, Dr. Arun Vishwanath joined the podcast to discuss the theory of cyber hygiene, what it is, and why it needs to become part of everyone's vocabulary. 

Posted on 03.04.20 by Greg Mooney

What is the HIPAA Omnibus Rule?

In this article, we discuss what the HIPAA Omnibus Rule is and how it relates to HIPAA and HITECH.

Posted on 02.27.20 by Greg Mooney

What is file transfer protocol (FTP)?

At its simplest, File Transfer Protocol (FTP) is a rudimentary method of moving files from one location on a network to another. 

Posted on 02.11.20 by Greg Mooney

File Transfer Protocol (FTP) vs. Managed File Transfer (MFT)

This article provides the detailed features comparison needed when the need for file transfer moves from occasional to operational.

Posted on 02.04.20 by Greg Mooney

Podcast: A Different Perspective on Shadow IT

Shadow IT usually is the crux of IT teams. It creates an issue of visibility within the IT stack that leaves IT in the dark. But maybe that's not the whole story?

Posted on 02.03.20 by Greg Mooney

What is Cloud Security Posture Management? (CSPM)

For years, security concerns kept many business leaders convinced it was too risky to migrate the IT environment to the cloud. But in recent years, there’s been a shift.

Posted on 01.24.20 by Greg Mooney

What is the Federal Information Security Management Act (FISMA)?

Updated most recently in 2014, FISMA defines a framework to defend information, operations, and digital assets against natural disasters and man-made cyber threats.

Posted on 01.21.20 by Greg Mooney

5 Ways Employees Move Data and Why It's Detrimental to Data Security

Whether it's your Marketing, Sales, or Finance team, employees are always trying to get work done as quickly as possible.

Posted on 01.07.20 by Greg Mooney

Security Considerations for Data in the Cloud

On-premise data centers vs. the cloud: which environment offers stronger data security?

Posted on 12.30.19 by Greg Mooney

Podcast: Using Automation and Threat Modeling to Protect Your Network

Proper security hygiene is impossible without some form of automation. Too many hours are wasted due to manual effort when security and IT teams could be spending time on more critical issues.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.