<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Posted on 04.23.19 by Jeff Edwards

Everything You Need to Know About China's Cybersecurity Law

In this article, we'll  answer some of the most common questions about the CSL, and make compliance goals as clear as possible.

Posted on 04.23.19 by Greg Mooney

Podcast: Have You Met? David Perkins, Level 8 Solutions

Level 8 Solutions called into the Defrag This - Have You Met? podcast studio to provide some insight into how they are implementing IT solutions in the UK.

Posted on 04.23.19 by Frank Jablonski

Top 5 Types of Mobile Device Breaches

Mobile devices are one of the weakest links in cyber security for businesses, yet very little is being done to mitigate the risks around these top 5 types of mobile device breaches.

Posted on 04.18.19 by Adam Bertram

Using Zapier to Automate Common Business Workflows

A typical company has thousands of workflows happening all of the time, whether it's onboarding new employees, approving expense reports or opening up a helpdesk ticket.

Posted on 04.17.19 by Greg Mooney

MiFID II: What IT and Compliance Teams Need to Know

MiFID II signifies the continuing onslaught of financial market regulations that demand transaction transparency. Such regulations burden compliance and IT teams who have to ensure their companies meet increasingly stringent security standards.

Posted on 04.17.19 by Frank Jablonski

The Biggest Security Risks of Using 3rd Party APIs

Businesses have steadily improved their perimeter security to better protect against an ever increasing number of cyber attacks. This has left hackers to look for other, less challenging paths to an enterprise’s data in 3rd party APIs.  

Posted on 04.10.19 by Kevin Conklin

HIPAA Compliance & Managed File Transfer: Do You Have a Safety Net?

Security breaches are occurring at an alarming rate as cybercriminals continue to successfully infiltrate the IT infrastructures of organizations across many industries. 

Posted on 04.09.19 by Greg Mooney

What's Up with Wi-Fi 6?

Wi-Fi 6 is almost here and although it boasts some significant increase in speeds, it’s main attraction will be connecting and securing more devices at once since we are connecting more IoT and mobile devices to networks.

Posted on 04.08.19 by Adam Bertram

How to Validate Infrastructure Changes Using PowerShell Pester Tests

Changes can make infrastructure better or can bring it to its knees. Change management is a crucial part of managing infrastructure in an IT pro’s world. When you do make changes, are you sure you changed the right setting? Are you sure that change you made didn’t affect...

Posted on 04.05.19 by Greg Mooney

Podcast: Does Brexit Outcome Have Any Effect on Compliance?

If you’re an IT person, why would Brexit mean anything to you? The short answer: it doesn’t right now. At least not until we understand how Brexit will play out. In this podcast, we discuss the possible outcomes for Brexit and their effect on IT operations.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.