Managing the Madness: BYOD Network Devices
When it comes to technology, device management resources have come a long way, just as much as the technology in our actual devices has. As a network or systems admin,…
Who Protects the Protectors?
Remember the person in my last post who asked me to describe a load balancer? They came back and asked about ASAs. I’m not sure if they really wanted to…
Non-IT File Sharing and HIPAA Implications
December 6, 2017
Security
When I first considered writing this post about possible HIPAA violations, I could clearly imagine how non-IT compliant file sharing could cause issues with HIPAA compliance. It wasn’t until I…