<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.


Posted on 03.20.18 by Michael O'Dwyer

IoT Security: What is It, and Why Does It Matter?

You may consider ‘IoT security’ an oxymoron and, unfortunately, for many IoT devices, you’re quite correct. The IoT and security don’t necessarily go together, with many companies and domestic consumers using IoT devices that lack fundamental layers of security. This...

Posted on 03.05.18 by Jeff Edwards

Defrag The Month: The Biggest IT Stories from February 2018

New month, new IT stories, and some (not so) new security problems. And what a month it’s been! From the Olympic hacks to cryptominers on government websites to the continued fallout of the Meltdown/Spectre flaws, February kept us busy. In this edition of Defrag This,...

Posted on 02.27.18 by Alex Jablokow

We Need to Increase Focus on Endpoint Security

Increasingly, corporate work is being carried out on mobile laptops, tablets, and smartphones, and corporate data is being held outside of the company’s own systems. 

Posted on 02.12.18 by Jeff Edwards

2018 Olympics Site Snowed Under by Hackers: Who's Responsible?

Just four days in and the 2018 Winter Olympics have already seen their fair share of setbacks. First, there’s the norovirus, which has reportedly infected 194 athletes, then there’s the gale force winds, disrupting and postponing events. But forces of nature aside, the...

Posted on 02.08.18 by Jeff Edwards

Bad Karma: Typosquatters Set Up Fake 'Reddit.co' To Steal User Credentials

Aggregator and social network Reddit.com is one of the most popular websites on the internet. In fact, the site it touts itself as the “front page of the internet." But that level of popularity has made it a target for fraudsters, and now, Reddit users, especially those...

Posted on 02.06.18 by Michael O'Dwyer

Digital Threats to Democracy—Real and Imagined

Democracy is in many ways about protecting freedoms, the freedom of the press, the freedom to bear arms, to arm bears, to vote in elections, and much more. With the advancement of technology, many feel these freedoms are under threat and the alleged Russian interference...

Posted on 01.29.18 by Rick Robinson

Data Privacy vs. Data Protection

This article will stick to the American usage — but remember that if you are operating globally, the terminology can get confusing.

Posted on 01.26.18 by Ipswitch Blog

File Transfer Protocol (FTP) vs. Managed File Transfer (MFT)

For many organizations, file transfer between users, locations, partners and/or customers is a key operational aspect to the business, so having the right file transfer software is crucial for smooth and secure management.

Posted on 01.24.18 by Alex Jablokow

Balancing Security and Ease of Use with Two-Factor Authentication

Username and password have long been the main method of authentication—and they remain so. But other authentication factors are often added to passwords to improve security. How well do these multi-factor authentication approaches work, and should businesses approach...

Posted on 01.23.18 by Adam Bertram

How to Create a Microsoft DHCP Lease Inventory Script

Large organizations typically have lots of devices that require IP addresses. Client desktops, tablets, mobile and desk phones, servers and more all consume IPs. The only way to manage IPs at this level is to use Microsoft Dynamic Host Configuration Protocol (DHCP),...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.