<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Greg Mooney
Greg is a technologist and data geek with over 10 years in tech. He has worked in a variety of industries as an IT manager and software tester. Greg is an avid writer on everything IT related, from cyber security to troubleshooting.
Find me on:

Recent Posts

Posted on 03.23.20 by Greg Mooney

What Is the Gramm-Leach-Bliley Act (GBLA)?

The Gramm-Leach-Bliley Act (GLBA) has been around since 1999, but it doesn't just affect financial services, it also requires higher education to comply.

Posted on 03.17.20 by Greg Mooney

The Cybersecurity Risks of Remote Employees Working From Home

The latest news and lockdowns around the world may seem drastic to some managers, but the reality is that working from home is the future for all office workers.

Posted on 03.12.20 by Greg Mooney

Podcast: Managing eWaste in a Secure and Compliant Manner

Businesses must consider all the data security implications when dealing with eWaste. Many companies are now opting to shred old equipment on top of using tools to wipe storage devices.

Posted on 03.04.20 by Greg Mooney

What is the HIPAA Omnibus Rule?

In this article, we discuss what the HIPAA Omnibus Rule is and how it relates to HIPAA and HITECH.

Posted on 02.27.20 by Greg Mooney

What is file transfer protocol (FTP)?

At its simplest, File Transfer Protocol (FTP) is a rudimentary method of moving files from one location on a network to another. 

Posted on 02.11.20 by Greg Mooney

File Transfer Protocol (FTP) vs. Managed File Transfer (MFT)

This article provides the detailed features comparison needed when the need for file transfer moves from occasional to operational.

Posted on 02.04.20 by Greg Mooney

Podcast: A Different Perspective on Shadow IT

Shadow IT usually is the crux of IT teams. It creates an issue of visibility within the IT stack that leaves IT in the dark. But maybe that's not the whole story?

Posted on 02.03.20 by Greg Mooney

What is Cloud Security Posture Management? (CSPM)

For years, security concerns kept many business leaders convinced it was too risky to migrate the IT environment to the cloud. But in recent years, there’s been a shift.

Posted on 01.24.20 by Greg Mooney

What is the Federal Information Security Management Act (FISMA)?

Updated most recently in 2014, FISMA defines a framework to defend information, operations, and digital assets against natural disasters and man-made cyber threats.

Posted on 01.21.20 by Greg Mooney

5 Ways Employees Move Data and Why It's Detrimental to Data Security

Whether it's your Marketing, Sales, or Finance team, employees are always trying to get work done as quickly as possible.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.