The image of a modern office has been rapidly changing in recent years. From the medical field, to sales, to technical support, users are on the road and working from…
When it comes to technology, device management resources have come a long way, just as much as the technology in our actual devices has. As a network or systems admin,…
Remember the person in my last post who asked me to describe a load balancer? They came back and asked about ASAs. I’m not sure if they really wanted to…
Over the last three posts, we’ve looked at Microsoft event logging use cases and identified a set of must-have event IDs. Now we’re ready to put our security policy in…
When I first considered writing this post about possible HIPAA violations, I could clearly imagine how non-IT compliant file sharing could cause issues with HIPAA compliance. It wasn’t until I…