I.T. : THE NEXT FRONTIER Put your IT skills to the test. Booby-trapped chambers! Pits of despair! And most horrifying of all —a bunch of space heaters, all plugged into one surge protector! Welcome to Server Room of Doom — th... Best Practices Power Procurement Rack Strategy May 13, 2024
Why You Need to Understand "Secure by Design" Cybersecurity Practices Cybersecurity has become a critical foundation upon which many aspects of business rely. Whether you’re a large enterprise or small business, network security is a must. Cyberattacks can have long-ter... Best Practices Cybersecurity Security Strategy Oct 5, 2023
10 Biggest Cybersecurity Mistakes of Small Companies Cybercriminals can launch very sophisticated attacks. But it’s often lax cybersecurity practices that enable most breaches. This is especially true when it comes to small and mid-sized businesses (SMB... Awareness Best Practices Cybersecurity Hacking Managed Security Security Strategy Oct 5, 2023
Does Your Business Have Any Cybersecurity Skeletons in the Closet? Let’s dive into a topic that might give you the chills—cybersecurity skeletons in the closet. You may not have old skeletons hidden away in the basement. But there’s a good chance of cybersecurity vul... Best Practices Cybersecurity Sep 7, 2023
12 Ways to Protect Against a Ransomware Attack ... Best Practices Cybersecurity Ransomware Aug 18, 2023
When IT Admins Go Bad Listen to Felicia's podcast episode Your browser does not support the audio element. Several examples of when IT admins go bad. I talk about steps you need to take to ensure that a bad IT admin doesn'... Best Practices Cybersecurity Insider Threats Security Strategy Aug 10, 2023
Criminal Fraud in IT Listen to Felicia's podcast episode Your browser does not support the audio element. Learn from the mistakes of others in order to prevent being the victim of criminal fraud in IT. Real life example o... Best Practices Cybersecurity Vendor Risk Management Aug 9, 2023
Leaving Computers On All The Time Turn off, or not? I was recently asked the following question. "I say that leaving my computer on overnight does not expose it to hacking, but some disagree with me. (You advised me to leave it on as ... Best Practices Hardware Maintenance Aug 8, 2023
S.M.A.R.T. is smart for hard drives S.M.A.R.T. is self-monitoring, analysis, and reporting technology for hard drives. This technology used to be an optional component on hard drives, but it is now included on all newly manufactured har... Best Practices Hardware Monitoring Aug 8, 2023
Why We Must Block Advertisements Blocking advertisements specifically and by category can save your computer from getting infected or otherwise hacked. I have been talking about this fact for years and have been actively blocking adv... Best Practices Cybersecurity Data Privacy Aug 8, 2023
Use TraceRT for WAN Performance Optimization This article will help network administrators determine the best DNS server settings to use for WAN lookup settings inside of a perimeter security appliance. The DNS server settings discussed here are... Best Practices Networking Aug 2, 2023
A Guide to Passwords and Password Security What is a password, exactly? A password is a string of characters that you give to verify that you are you when you log into a computer system. On most systems, a password is between 6 and 8 character... Best Practices Password Security Productivity Aug 2, 2023