<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Posted on 10.29.19 by Greg Mooney

Podcast: IT Horror Stories

In this podcast, we hear from a few IT experts about the worst IT nightmares they've ever encountered.

Posted on 10.25.19 by Jeff Edwards

Why Retailers Are a Soft Targets to Hackers (And What to Do About it)

Time and time again, retailers prove to be a popular (and easy) target for hackers. The tangible and intangible costs for an e-commerce site that’s been breached can escalate quickly. In this post, we'll explore the issue, and outline some solutions. 

Posted on 10.23.19 by Tim Warner

Managing Azure Blueprints with PowerShell

Azure Blueprints provide a "one-stop shop" for Azure governance. By implementing JSON templates and a controlled, unified workflow, Azure administrators can define, deploy, enforce, and maintain standardized Azure environments.

Posted on 10.21.19 by Michael O'Dwyer

4 Ways to Rescue Your Rep After You've Been Hacked

I’d like to believe that all readers will use this post to prepare for a ‘what if’ scenario but the sad truth is that some of you are reacting to a data breach and lack an incident response plan.

Posted on 10.17.19 by Dan Franciscus

Searching Active Directory with PowerShell

For many Microsoft IT professionals, one of the first things they do with PowerShell is using it to perform tasks in Active Directory.

Posted on 10.16.19 by Tim Warner

Provide High Availability for Azure AD Connect

Once you start rolling with Azure AD Connect and hybrid identity between local Active Directory and Azure Active Directory, one of your first thoughts is, "What happens if my Azure AD Connect server goes offline?"

Posted on 10.16.19 by Jeff Edwards

PCI DSS Compliance 101: What You Need to Know

If your business deals with credit card payments in any way, then PCI compliance is going to be a fact of life, and an essential part of running your business securely and efficiently. PCI compliance is a critically important step in protecting your customer's or...

Posted on 10.15.19 by Greg Mooney

9 Ways for IT to Plan How to Respond to Natural Disasters

Plan, practice, and then keep on practicing! It sounds so simple, but those are the keys for IT teams who have to respond to a disaster delivered by Mother Nature—whether it’s a flood, fire, earthquake, or a major storm such as a hurricane or tornado.

Posted on 10.14.19 by Michael O'Dwyer

Do Customers Really Care About Data Breaches?

How much customers care about data breaches is often dependent on the type of customer data obtained by attackers.

Posted on 10.10.19 by Greg Mooney

4 Myths of PCI Compliance

If your organization is finding it difficult to comply with PCI DSS, the Payment Card Industry Data Security Standard, it could be due to some of the misconceptions about the standard.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.