<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

security

Posted on 07.15.19 by Greg Mooney

Peer-to-Peer File Sharing: How to Protect Your Sensitive Data

Efficient collaboration and peer-to-peer file sharing are important for any job, but you don't want to do it in a way that leaves data unprotected.

Posted on 07.12.19 by Dan Franciscus

Using Make Me Admin for Administrator Privilege

In this article, we discuss how to grant users simple admin rights temporarily like installing software. This helps keep IT from getting bogged down.

Posted on 07.10.19 by Greg Mooney

The Difference Between PGP, OpenPGP, and GnuPG Encryption

Ah, cryptography. It’s so important to us in our every day lives and yet it has one of the longest and confusing pasts of any type of technology we use today.

Posted on 07.09.19 by Jeff Edwards

Why Your Encryption is Only as Good as Your (Multi-Factor) Authentication

Username and password may be the de-facto means of authentication for many organizations, but they can easily be the weakest link in security controls. In this article, we’ll detail why Multi-Factor Authentication (MFA) should be paired with encryption for top-level...

Posted on 07.08.19 by Michael O'Dwyer

Double Encryption: Is It More Secure Or Dangerous?

Since encryption is used to secure data, it would seem only natural that encrypting something twice would increase security. However, that isn't always the case.

Posted on 07.01.19 by Jeff Edwards

Encryption At Rest Isn't Good Enough

There are basically two ways to keep data out of the hands of hackers. One is to protect every endpoint leading to it, making it essentially inaccessible. The other is to encrypt the data, so that even if hackers get to the document they cannot read it. But where should...

Posted on 06.28.19 by Michael O'Dwyer

Should Companies Be Concerned About Huawei Tech?

Should businesses be worried about Huawei tech on their networks or is this really just hysteria and a political agenda that is sending shockwaves across the IT landscape? Let's discuss.

Posted on 06.27.19 by Missy Januszko

A DevOps Primer For Healthcare IT Teams

DevOps, the latest in software engineering and IT operations trends, defines a set of processes, tools, practices, and interactions that foster collaboration between developers and operations to achieve high-quality business outcomes. In this article, we are going to...

Posted on 06.26.19 by Eric Bruno

How to Avoid Scripting Nightmares for File Transfers

Scripting is a popular and powerful choice to automate repeatable file transfer tasks. It can be horrifying, though, to discover just how many scripts are relied on for the successful operation of your infrastructure. This and the time they take to execute are sure to...

Posted on 06.21.19 by Dan Franciscus

Detecting and Defending Against Pass the Hash Attacks

A pass the hash attack is a common attack vector utilized by many adversaries. In this attack, a Windows username is paired with the hashed value of a Windows account password. Let's take a deeper look.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.