<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Posted on 09.19.19 by Greg Mooney

Podcast: Have You Met? Orsenna

We recently had a chance to sit down with Progress' partner, Orsenna, who has been serving WhatsUp Gold customers in Europe. More specifically, Switzerland.

Posted on 09.18.19 by Michael O'Dwyer

How to Lower the Risk of Employee Data Theft

As IT pros, we’ve been aware for quite some time that some users are a threat to security, whether by their use of shadow IT, their susceptibility to social engineering attacks from cybercriminals, or by using their employee role and access permissions to compromise data...

Posted on 09.17.19 by Dan Franciscus

Four Chocolatey Security Features

The process of securely installing software in Windows is something that IT professionals grapple with, especially in an enterprise setting.

Posted on 09.13.19 by Jeff Edwards

Why you Shouldn’t Use FTP to Transfer Cloud Files

The cloud is a fact of life in 2019. From basic cloud collaboration tools to storage buckets on massive cloud platforms like Azure and AWS, most businesses perform thousands of cloud file transfers every day, whether they’re aware of it or not. For businesses and IT...

Posted on 09.12.19 by Michael O'Dwyer

3 Data Backup Tools Worth Considering

If you are a small or medium business, you may have left your data backups in the hands of outside help or, even worse, to chance.

Posted on 09.11.19 by Greg Mooney

Podcast: Information Governance Report

When it comes to cost savings for IT operations and businesses in general, information governance is probably the last thing you think of. In this podcast, we discuss the implications of information governance.

Posted on 09.09.19 by Michael O'Dwyer

4 Reasons WannaCry is Still An Issue Over 2 Years Later

Two years plus and counting and companies are still being impacted by WannaCry. Here are the four main reasons why an old exploit and ransomware is still an issue.

Posted on 09.04.19 by Mark Towler

End User Access Should Not Be Binary

In our computerized world, things tend to be reduced to binary as often as possible. 1 or 0. On or Off. Positive or Negative. Access Granted or Access Denied. That shouldn't always be the case.

Posted on 09.03.19 by Dan Franciscus

Measuring Reboot Time with PowerShell

In enterprise environments, you will usually find an array of different Windows operating systems, hardware and of course software. Typically, machines are managed and configured with group policy and SCCM, or perhaps other more modern methods like Chef or Puppet. One of...

Posted on 08.29.19 by Jeff Edwards

Why Auditable Access Controls Matter

By now, you should know that controlling access to sensitive files, devices, tools, and network areas is of utmost importance in cybersecurity, but you should also know that it’s not enough to simply control how users access resources. It’s equally important to be able...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.