information security

Tag: information security

Bringing Ease of Use and Security to Remote Users

The image of a modern office has been rapidly changing in recent years. From the medical field, to sales, to technical support, users are on the road and working from…

Managing the Madness: BYOD Network Devices

When it comes to technology, device management resources have come a long way, just as much as the technology in our actual devices has. As a network or systems admin,…

Who Protects the Protectors?

Remember the person in my last post who asked me to describe a load balancer? They came back and asked about ASAs. I’m not sure if they really wanted to…

Microsoft Workstation Logs – Configuration

Over the last three posts, we’ve looked at Microsoft event logging use cases and identified a set of must-have event IDs. Now we’re ready to put our security policy in…

Non-IT File Sharing and HIPAA Implications

When I first considered writing this post about possible HIPAA violations, I could clearly imagine how non-IT compliant file sharing could cause issues with HIPAA compliance. It wasn’t until I…