Passed in 1996, the Health Insurance Portability and Accountability Act (HIPAA) was established to improve the healthcare system’s storage and use of patient data. As health insurance and healthcare services modernize and digitalize, more health information is stored, transferred, and updated digitally. While this streamlines many administrative and care delivery functions, it also poses a … Read more What is HIPAA Compliance?
As organizations invest more heavily in their digital infrastructure, the consequences of data breaches and cybersecurity attacks have increased in turn. Indeed, research from the Ponemon Institute indicates that the average cost of a data breach in 2018 rose by 6.4% compared with the previous year to a total of $3.86 million. Related to that, … Read more What is a Data Breach? Ultimate Guide to Cyber Security Breaches in 2020
Microsoft OneDrive for Business is a cloud-based storage platform designed to help you organize, access, edit, update, and send files across devices. In 2014, Microsoft launched OneDrive, a rebranding of its original storage platform SkyDrive, with a mission to simplify cloud storage for all. Many businesses choose OneDrive because it offers many opportunities to share … Read more Is OneDrive Secure? Microsoft OneDrive for Business Security Risks
Security Groups, User Accounts, and Other AD Basics At many enterprises and SMBs that use Windows devices, IT teams are likely to use Active Directory (AD). Essentially, Active Directory is an integral part of the operating system’s architecture, allowing IT more control over access and security. AD is a centralized, standard system that allows system … Read more The Ultimate Guide to Active Directory Best Practices in 2020
In 2002, Congress passed the Sarbanes-Oxley Act, named after its sponsors Senator Paul Sabanes (D-MD) and Representative Michael G. Oxley (R-OOH-4). Instituted “to protect investors by improving the accuracy and reliability of corporate disclosures made pursuant to the securities laws,” the Sarbanes-Oxley Act (commonly referred to as SOX) established a stricter protocol for internal controls … Read more What is SOX Compliance?
With the unrelenting news about security breaches, file integrity monitoring (FIM) software has become an indispensable tool for any organization. It helps improve data security, which is important for any company and shouldn’t be ignored. What Is File Integrity Monitoring? As opposed to other security measures, FIM solutions are specifically designed to monitor changes in … Read more 6 Best File Integrity Monitoring Software in 2020
With the three pillars of observability considered more or less canon for IT monitoring philosophy these days, and logging being one of those pillars, it’s important to understand the tools, systems, and solutions that help IT practitioners do a good job of aggregating, normalizing, and leveraging logs in all their forms to provide improved insight … Read more 10 Top Log Management Tools 2020
Basics of Network Monitoring General Networking IP Addresses and Subnetting Switching and Routing Domain Name System (DNS) Dynamic Host Configuration Protocol (DHCP) General Windows Monitoring Elements General Monitoring Techniques and Protocols Ping Simple Network Management Protocol (SNMP) Syslog Leveraging the Power of Scripts Database Basics Relational database design SQL queries Tips and Resources Monitoring 101 … Read more Ultimate Guide to Network Monitoring
For administrators managing assets across enterprise networks, Active Directory is one of the most important tools in their toolbox. It doesn’t matter how large or small your operation is—managing assets, users, and authorizations across your network can be a headache. While Microsoft Active Directory (AD) is pretty indispensable when it comes to keeping tabs on … Read more Best Active Directory Management Tools in 2020
Monitoring user-facing software has always been important, no doubt about it. But with the unrelenting migration of software to the cloud, and the adoption of microservices and serverless architectures such as Function as a Service (FaaS), monitoring is now business-critical. These new ways of building modern software involve many moving parts, and developers need to … Read more Cloud Monitoring Basics: Page Speed, App Performance, Log Analysis