<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

Defrag This | Read. Reflect. Reboot.

Posted on 05.12.17 by Greg Mooney

Massive Malware Attack Will Infect More Than Healthcare

Ransomware is infecting businesses across the globe, from healthcare to telecommunications. And the malware is spreading via a known exploit that was leaked and patched months ago. 

Posted on 05.12.17 by Greg Mooney

Defrag This - Headless AI For Business

Headless AI, otherwise known as bots, are taking over the world. How can these headless AI help businesses get work done more effectively?

Posted on 05.11.17 by Adam Bertram

How to Use PowerShell to Monitor REST APIs

This article explains how to use PowerShell to monitor REST APIs. 

Posted on 05.10.17 by Kevin Howell

What Is Cloud Monitoring?

Even if all or part of your infrastructure is in the cloud, you need to monitor it. This article describes the what and how of cloud monitoring. 

Posted on 05.08.17 by Michael O'Dwyer

The GDPR and US Data Protection Regulations Diverge

There are some serious difficulties ahead for businesses in the wake of the repeal of the US Internet Privacy Bill. How can US businesses comply with the GDPR?

Posted on 05.05.17 by Virginia Lux

Homebuyers Lose Potential Home For Trusting Email

Email is not safe, yet so many businesses from healthcare to financial institutions use email as a method of moving sensitive data. Here is another example of what can go wrong. 

Posted on 05.04.17 by Michael O'Dwyer

Business Associate Agreement Under HIPAA Could Apply to You

The U.S. Department of Health and Human Services, Office for Civil Rights (OCR) recently sued a small healthcare practice. Turns out they didn't have a BAA in place.

Posted on 05.04.17 by Greg Mooney

Sysadmin Wars: Which side of the force are you?

Some IT pros serve to do good, while others use their powers for evil. Which side of the force are you? This infographic will help you decide.

Posted on 05.03.17 by Virginia Lux

How Can Property and Casualty Insurers Secure Data?

How can property and casualty insurers (P&C) get from First Notice of Loss (FNOL) to claim resolution quickly and efficiently while keeping data secure?

Posted on 04.27.17 by Michael O'Dwyer

Reducing Security Breaches in Fintech is a Business Priority

Fintech is a valuable target for hackers seeking financial reward and we can’t stop all breaches without changing our attitude towards security.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.