<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

security

Posted on 01.05.18 by Jeff Edwards

Meltdown: What you need to know about the Intel Core Bug Affecting Billions of Computers

Just last week, we were looking back at the most significant hacks and attacks of 2017, and wondering what lay ahead for 2018. Well, wonder no more.

Security researchers have discovered two major design flaws in Intel processor chips that affect millions of devices—in...

Posted on 01.03.18 by Jacqueline Lee

SOX Compliance: What is the IT Team's Role?

Remember the corporate accounting scandals that took out Enron, Arthur Andersen and WorldCom? They all ended with prison sentences, layoffs, and billions of investor dollars lost forever.

Posted on 01.02.18 by Randy Franklin Smith

The Basics of File Transfer Encryption

The Internet is a scary place for businesses, which is obviously why many are paying closer attention to best practices for securing their file transfers. 

Posted on 12.29.17 by Alex Jablokow

VoIP and the Wild World of Toll Fraud

Most don't think about their telephone system when it comes to securing their network, but VoIP is actually a common vector of attack. 

Posted on 12.22.17 by Greg Mooney

Defrag This - The Year of the Data Breach

There's no debate, 2017 is going down as the year that cyber security went mainstream. Hosts, Greg Mooney and Jeff Edwards discuss the biggest data breaches of 2017.

Posted on 12.22.17 by Jeff Edwards

Looking Back at 2017's Biggest Data Breaches

2017 will go down in the history books as the year that data breaches became mainstream news. From the WannaCry attacks to Equifax, it seems like there's a new breach in the headlines every week. 

Posted on 12.21.17 by Kathleen Burns

Alteryx Data Leak: 120 Million Households Exposed

Earlier this month, personal information of over 120 million American households was exposed online. What does this say about how our information is protected?

Posted on 12.21.17 by Greg Mooney

PICNIC Podcast #16 - Human Element of Fighting Cyber Crime

Here’s the situation: your company is experiencing significant growth. You’re about to lead your firm and your workers to the step that will get all of you to the next level. But before you do, one of your workers encounters some ransomware and opens a data breach that...

Posted on 12.21.17 by Jeff Edwards

The Worst Passwords of 2017 Are Just as Embarrassing as You Thought

It’s that time again, where, with the new year ahead, we make resolutions to better ourselves, and look back on the past year and face just how bad we really were….at coming up with strong passwords.

Posted on 12.19.17 by Alex Jablokow

SIEM Evolution: From Compliance to Security

Security information and event management (SIEM) software provides a way to track, integrate, and analyze the vast amount of log data that comes from an organization’s applications and network hardware. Its original value came from compliance reporting, but it is...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.