logo

Virtualization As a Part of Disaster Recovery Plan

Mitigation (eliminating or lowering the impact of an incident) is a crucial part of any Disaster Recovery plan, as well as planning itself. I’ve always wanted to underscore the need to have this sorted out in advance, and Hurricane Sandy is the ideal place to point. Some of you will remember hearing about this when … Continued

A 4-Point Summary of FISMA Compliance in 2015

Federal agencies, subcontractors, service providers, and organizations that operate IT systems on behalf of Federal agencies need to be aware of their compliance with the Federal Information Security Management Act (FISMA). This Act exists to safeguard the importance of information security related to the economic and national security interest of the United States. Despite serious … Continued

Tracking Malicious Windows Server Events with PowerShell

Windows servers can potentially generate thousands—or even hundreds of thousands—of events daily. Most are created from perfectly safe events that system administrators use to get a glimpse of what’s going on. An event might be generated to indicate a disk is running out of free space, an error occurred with Active Directory, or perhaps a … Continued

3 Ways to avoid HIPAA Violations in a Healthcare Office

The Health Insurance Portability and Accountability Act (HIPAA) defines and establishes compliance regulations for healthcare providers surrounding protected health information (PHI) within healthcare organizations. The consequences of non-compliance are dire, as unsecure PHI can significantly increase the risk of identity theft for patients and have long-reaching professional consequences for individuals with compromising medical histories. Of … Continued