<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Posted on 11.07.18 by Greg Mooney

Podcast: Shadow IT Problems & Solutions

Shadow IT is a real problem in the modern workplace. In this episode of Defrag This, we explore the reasons users turn to the dark side, the risks of unsanctioned IT stacks, and some of the solutions IT teams can use to curb Shadow IT. 

Posted on 11.06.18 by Greg Mooney

Election Day 2018 - US Electronic Voting Machines Still Have Security Flaws

Today is election day and voters are running to the polls to cast their vote. However, recent reports indicate that US citizens are not particularly confident in the technology used at the ballots. 

Posted on 11.02.18 by Dan Franciscus

Import Machine Images Into AWS with Packer

Amazon Web Services (AWS) is still the most popular cloud platform and Packer provides great integration that enables users to import builds into AWS and convert them to Amazon Machine Images (AMI).

Posted on 10.31.18 by Edgar Allan Mooney

The Ghost in the Machine – A Spooky Short Story About a Sysadmin

Once upon a blood moon, there was a sysadmin called Kyle and he almost lost it all to the ghost in the machine...

Posted on 10.31.18 by Mark Towler

Enforcing Security Policy Agreement at Sign On with MOVEit

It’s a given that users with access to your MFT solution have permission to use it and know exactly what they are allowed to do with it. But maybe it shouldn’t be.

Posted on 10.29.18 by Nate Lewis

Safeguarding Your Network From Insider Threats

"The call is coming from inside the house...” This line from 1979’s When a Stranger Calls terrorized audiences by introducing the notion that the things we should be most fearful of may be in the spaces we feel most safe. This idea translates neatly to the enterprise...

Posted on 10.25.18 by Michael O'Dwyer

Benefits of Managed File Transfer for Banking and Finance

In the BFSI (banking, financial services and insurance) industry, choosing a managed file transfer solution is rather simplified as FTP alone is not enough to meet the necessary regulatory and compliance requirements. 

Posted on 10.23.18 by Adam Bertram

How to Run Commands on Remote Computers with PowerShell

Running commands locally on the remote computers is a common task many IT admins have to do every day. Here's how you can do that in PowerShell.

Posted on 10.19.18 by Greg Mooney

Securing Your IoT: What Can Your InfoSec Team Do?

Joining the Internet of Things phenomenon can generate valuable information for your business, but it also creates vulnerabilities that can threaten your digital assets.

Posted on 10.19.18 by Alex Jablokow

Balancing Security and Ease of Use with Two-Factor Authentication

Username and password have long been the main method of authentication—and they remain so. But other authentication factors are often added to passwords to improve security. How well do these multi-factor authentication approaches work, and should businesses approach...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.