SMB cloud adoption has trailed behind enterprise rates for some time. Whether due to inadequate resources, overbearing security requirements or a simple misunderstanding of the technology, the small and midsize market has only recently begun to make significant cloud...
IT audit procedures run the gamut from internal to market-specific. Whether it's healthcare's HIPAA or the credit-card industry's PCI, you have to know the compliance audit's goals. These rarely include a fully functional missile defense system to protect against...
Michael O'Dwyer | | IT Insights
E-discovery refers to the disclosure of information in electronic or digital formats as part of litigation, government investigations or requests that relate to the freedom of information act. The National Law Review notes that, in recent years, issues related to...
As we use PowerShell Toolmaking to automate more tasks, most of us eventually find ourselves reinventing the wheel. We write a script to do task X, another to do task Y, then task Z comes around. A few weeks go by and we begrudgingly write another script to do task X...
In early June, the news broke that the Angler exploit kit was no longer the method of choice for malware delivery, especially ransomware. According to SC Magazine, attackers have now switched to the Neutrino exploit kit, perhaps in an effort to avoid detection.
Joe Hewitson | | Security
In the modern business world, applications are the vehicles for getting stuff done. This has become even more apparent as mobile technology enables us to be more productive in more places than ever before. But despite all the buzz about security in the mobile world,...
Today marks the 17th annual Systems Administration Appreciation Day, or Sysadmin Day as it’s more often called.
Before the days of PowerShell Test-NetConnection, we had many different command-line tools we could choose from to troubleshoot various network connectivity issues. We had ping for testing ICMP echoes and replies; tracert to see where our packets might be getting...
Mark Underwood | | IT Insights
Artificial intelligence (AI) is on a roll. There's more AI technology and innovation coming into our everyday lives than ever before. It's happening through developments spurred on by 800 pound tech gorillas like Amazon and IBM, and big brands in transportation like Uber...
Adam Bertram | | Automation | File Transfer | Security
You shouldn't have to babysit all of the file copies; scheduled tasks is perfect for automating this job.
Advanced technology has become an integral part of society — according to Pew Research, 67 percent of U.S. adults have broadband internet access at home, while 13 percent have tossed traditional connections and exclusively use mobile devices. But the evolution of...
The Dark Web. You've heard the term. It pops up in mainstream news stories about illegal goods, stolen identities and credit card fraud. It's a kind of digital boogeyman for ordinary users and IT pros alike, making it easy to mistake fear for facts and hype for helpful...
Adam Bertram | | Security
In today's dangerous cyber environment, it's more important than ever to protect your data. Bad guys are always on the lookout for an easy score. As a sysadmin, it's one of your many jobs to set up security controls and make sure your network is not an easy target.
The spread of VoLTE and VoWiFi phones and services could spur cord-cutting by consumers and businesses. In 2013, the U.S. Centers for Disease Control and Prevention estimated that two out of every five American households had already cut their ties to landlines — and...
Greg Mooney | | Security
For IT managers in regulated industries, audits are a way of life. Proactive record keeping will be critical for when those pesky auditors walk through the front door. This is where a secure FTP (sFTP) tool can play a big role. In a post-Enron world, transparency is key...
Scripts are the meat and juice of system administrators. Being able to make use of an extensive set of scripts suitable for different tasks is essential for a sysadmin. But how do you actually do the script management?
Michael O'Dwyer | | IT Insights | Security
IT pros should not have to support users who lack basic IT skills. A bold statement, I know. But when network users display a complete absence of IT soft skills and common sense, even as security breaches become almost commonplace, they leave us with no choice.
Michael O'Dwyer | | IT Insights
For many, the future of virtual reality is of little concern — in work-related tasks at least — as most still tend (and prefer) to work in the real world.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.