<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

Posted on 03.17.20 by Greg Mooney

The Cybersecurity Risks of Remote Employees Working From Home

The latest news and lockdowns around the world may seem drastic to some managers, but the reality is that working from home is the future for all office workers.

Posted on 03.12.20 by Greg Mooney

What Is FERPA and What Are the Necessary Security Controls?

The right to privacy for individuals impacts just about every industry, and education is no different.

Posted on 03.12.20 by Greg Mooney

Podcast: Managing eWaste in a Secure and Compliant Manner

Businesses must consider all the data security implications when dealing with eWaste. Many companies are now opting to shred old equipment on top of using tools to wipe storage devices.

Posted on 03.10.20 by Michael O'Dwyer

What Is Knowledge Management?

In this article, we dissect the term 'knowledge management' and discuss how it relates to information and data.

Posted on 03.05.20 by Greg Mooney

Podcast: Why Cyber Hygiene Is So Important

In this podcast, Dr. Arun Vishwanath joined the podcast to discuss the theory of cyber hygiene, what it is, and why it needs to become part of everyone's vocabulary. 

Posted on 03.04.20 by Michael O'Dwyer

4 Basics of Identity Access Management (IdAM or IAM) that IT Pros Should Know

Call it Identity Management (IDM), Identity Access Management (IdAM), or even IAM; IT is responsible for its implementation and ongoing maintenance.

Posted on 03.04.20 by Greg Mooney

What is the HIPAA Omnibus Rule?

In this article, we discuss what the HIPAA Omnibus Rule is and how it relates to HIPAA and HITECH.

Posted on 02.27.20 by Greg Mooney

What is file transfer protocol (FTP)?

At its simplest, File Transfer Protocol (FTP) is a rudimentary method of moving files from one location on a network to another. 

Posted on 02.25.20 by Tim Warner

Getting Started with Azure Bastion

Azure Bastion can best be described as a managed jump host. A jump host, also called a jump box, is a virtual machine that's placed on a virtual network. This article describes how to get started with Azure Bastion.

Posted on 02.19.20 by Tim Warner

Configure 'Break Glass' Emergency Access for Azure Active Directory

In cloud computing generally and in Microsoft Azure specifically, the shared responsibility model means that both Microsoft and you (the customer) have a role to play in ensuring service high availability.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.