<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

podcasts

Posted on 12.14.17 by Kevin Conklin

Podcast: How to Discuss Security Weakness in Wake of Equifax Breach

Data breaches have become so common that it can be difficult to catch the public attention, but we all sat up and took notice when we heard about the Equifax breach.

Posted on 12.07.17 by Kevin Conklin

Podcast: How to Protect Your Business and Personal Data from the Dark Web

It's hard to believe that most of us have some form of our personal data exposed on the dark web. Even if we practice the best data security practices, companies that harness are getting breached on a daily basis.

Posted on 11.30.17 by Kevin Conklin

Podcast: Understanding the Digital War Room

War Rooms are not going away anytime soon, they will only progress as technology progresses.

Posted on 11.27.17 by Greg Mooney

Podcast: 3 Things You Don’t Want to Forget While Prepping for GDPR

New regulations always mean a flurry of activity for affected companies, and the European Union’s new General Data Protection Regulation is no exception.

Posted on 11.23.17 by Greg Mooney

Podcast: How to Monitor Social Media from Phishers

Think hackers can only get you through email, and not social media? Think again.

Posted on 11.17.17 by Greg Mooney

Podcast: Ipswitch's Ribbon Cutting Ceremony

On this special edition of Defrag This, we celebrate by cutting the ribbon to Ipswitch's new headquarters, commemorate the 1 year anniversary of Ipswitch's EMEA Center of Excellence in Ireland, and team up with the Wonderfund to help children in need.

Posted on 11.16.17 by Greg Mooney

Podcast: Top 3 Reasons to Learn PowerShell

When talking about scripting languages, the conversation can often devolve into an “either/or” debate. Adam Bertram joins The PICNIC Podcast to discuss.

Posted on 11.14.17 by Greg Mooney

Podcast: The 3 Wireless (In)Security Protocols

Brad Call, Systems Specialist at Internal IT and Wi-Fi security expert discusses the security issues around user access to Wi-Fi and the security protocols every IT team should be using. 

Posted on 11.10.17 by Greg Mooney

Podcast: The Great Cyber War

There are a few reasons why ethics in technology and cybersecurity is more important than ever as the law struggles to catch up.

Posted on 11.09.17 by Kevin Conklin

Podcast: Marketing Automation & Migrations

In this episode of PICNIC, Rob Woodbury joins us to discuss a massive two year process of moving to a new consolidated CRM system and its implications on the company.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.