logo

Ryan Brooks

Product Evangelist at Netwrix Corporation, writer, and presenter. Ryan specializes in evangelizing cybersecurity and promoting the importance of visibility into IT changes and data access. As an author, Ryan focuses on IT security trends, surveys, and industry insights.
Security & Compliance
August 3, 2020

Is Microsoft 365 HIPAA Compliant?

Office 365 HIPAA compliance is a pressing concern for an increasing number of healthcare companies. Microsoft’s robust cloud solution lets providers keep records and communicate with ease — but...
Security & Compliance
July 16, 2020

How to Protect PII

A wide range of privacy regulations govern how organizations collect, store and use personally identifiable information (PII). In general, companies need to ensure data confidentiality, avoid data...
IT Operations
July 21, 2020

System Administrator Salary: How Much Can You Earn?

Many system administrators are concerned that they are not paid fairly, especially considering the high workload and long hours. In fact, the recruiting website Indeed.com reports that 43% of system...
IT Operations
July 7, 2020

Top Things that SysAdmins Really Hate

Being a sysadmin basically means being a superhero. Fighting bad guys (aka hackers), helping ordinary people (aka users), saving your home (aka IT environment) from various disasters — it all...
Security & Compliance
June 30, 2020

2020 State of the Cloud Statistics

Cloud Usage The cloud had become mainstream during the last couple of years, but the year of 2020 has pushed companies to adapt to remote working, which immediately led to a rapid adoption of cloud...
IT Operations
June 23, 2020

How to Manage Microsoft Office 365 Shared Mailboxes

Shared mailboxes in Microsoft 365 enable teams to collaborate and share email responsibilities. Here, we’ll help you learn how to create, configure and use Microsoft 365 shared...
Security & Compliance
June 12, 2020

10 Security Tips for Malware Prevention

According to Verizon’s 2019 Data Breach Report, 28% of data breaches involve malware. This dangerous software threatens every organization and is becoming more common every day. Companies must work...
Security & Compliance
June 11, 2020

Cybersecurity Assessment: Definition and Types

According to the national Common Vulnerabilities and Exploits (CVE) database, there are more than 11,000 known vulnerabilities in commonly used software and systems. IBM has calculated that breaches...
Security & Compliance
June 17, 2020

The Purpose of IT Risk Assessment. Why Bother?

IT risk assessment is the process of identifying security risks and assessing the threat they pose. The ultimate purpose of IT risk assessment is to mitigate risks to prevent security incidents and...
Show more articles