<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

Posted on 04.30.20 by Greg Mooney

What is MD5?

MD5 is still being used today as a hash function even though it has been exploited for years. In this article, we discuss what MD5 is; it's history, and how it is used today. 

Posted on 04.28.20 by Adam Bertram

How to Automate Azure Cloud Deployments with Azure ARM Templates

In this article, you’re going to learn how to create a simple Azure ARM template and deploy it into Azure using the Azure CLI.

Posted on 04.27.20 by Michael O'Dwyer

6 Ways for Financial Institutions to Avoid Wire Fraud

Wire fraud is a federal offense under U.S. law and refers to fraud committed using electronic communications, such as telephone or computer. Unfortunately for financial institutions, wire fraud is on the increase, and not just in the U.S.

Posted on 04.22.20 by Andrew Sanders

Top 7 Data Security Concerns for Lawyers

Relative to the sensitivity of the data that they protect, law firms have some of the laxest information security that you can find.

Posted on 04.21.20 by Gwen Luscombe

4 Ways Colleges and Universities Are Failing at Cybersecurity

Bursting with personal information and financial details for students and employees, as well as valuable research information that could result in financial loss if stolen, Universities are seen as having lax systems and an abundance of reward.

Posted on 04.21.20 by Neal O'Farrell

How a Pandemic Started a Trend Called Zoombombing

Zoom has seen hyper-growth during what IT teams are calling the "new normal." But that fame comes with a cost--the attention of hackers and security pros.

Posted on 04.16.20 by Robert Yeckley

UNIX Has Always Been More Secure Than Windows

By default, UNIX-based systems are inherently more secure than the Windows operating system. In this article, we describe precisely why that is.

Posted on 04.14.20 by Greg Mooney

Podcast: How IT Can Enable a Remote Workforce

Jason Rader from Insight Enterprises discusses the challenges IT teams are facing during the pandemic, such as Shadow IT and data security issues.

Posted on 04.13.20 by Michael O'Dwyer

HTTPS and A Padlock Does Not Mean A Website is Secure

Online shoppers are often encouraged to ensure that their chosen online stores are 'secure', that the 's' in HTTPS is visible, and that the web browser displays a lock symbol. Propagating these visible indicators as confirmation of website security is not only...

Posted on 04.08.20 by Adam Bertram

How to Send Slack Messages with PowerShell

One of the best ways to stay in contact with your remote team is a team collaboration service like Slack.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.