<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Posted on 11.20.18 by Jeff Edwards

How to Detect and Stop Cryptomining on Your Network

If 2017 was the year of the ransomware attack, then 2018, insofar as it can be defined by malware, was the year of cryptojacking. 

Posted on 11.16.18 by Jeff Edwards

How to Use Secure Folder Sharing in MOVEit 2018

One of the most persistent issues facing the modern IT team is the problem of Shadow IT. And that's the genesis of one of the most exciting new features of MOVEit 2018: the new Secure Folder Sharing capability. This new tool puts the power of creating and using secure...

Posted on 11.15.18 by Dan Franciscus

Create Windows Machine Builds with Packer

While it supports Windows and Linux, creating an OS image is vastly different between the two. In this article, I will focus on how Packer is used for Windows OS image creation.

Posted on 11.12.18 by Michael O'Dwyer

Is The EU Copyright Directive A Bad Idea?

The EU Copyright Directive has been labeled a bad deal for all parties and threatens the Internet as we know it. If it's approved, how are businesses going to respond?

Posted on 11.08.18 by Jeff Edwards

How to Increase Collaboration Without Reducing Security

Collaboration is of utmost importance in the modern workplace, but when done incorrectly, a collaborative environment can also be an insecure one. Here's how you can allow increased workplace collaboration, without reducing security.

Posted on 11.07.18 by Greg Mooney

Podcast: Shadow IT Problems & Solutions

Shadow IT is a real problem in the modern workplace. In this episode of Defrag This, we explore the reasons users turn to the dark side, the risks of unsanctioned IT stacks, and some of the solutions IT teams can use to curb Shadow IT. 

Posted on 11.06.18 by Greg Mooney

Election Day 2018 - US Electronic Voting Machines Still Have Security Flaws

Today is election day and voters are running to the polls to cast their vote. However, recent reports indicate that US citizens are not particularly confident in the technology used at the ballots. 

Posted on 11.02.18 by Dan Franciscus

Import Machine Images Into AWS with Packer

Amazon Web Services (AWS) is still the most popular cloud platform and Packer provides great integration that enables users to import builds into AWS and convert them to Amazon Machine Images (AMI).

Posted on 10.31.18 by Edgar Allan Mooney

The Ghost in the Machine – A Spooky Short Story About a Sysadmin

Once upon a blood moon, there was a sysadmin called Kyle and he almost lost it all to the ghost in the machine...

Posted on 10.31.18 by Mark Towler

Enforcing Security Policy Agreement at Sign On with MOVEit

It’s a given that users with access to your MFT solution have permission to use it and know exactly what they are allowed to do with it. But maybe it shouldn’t be.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.