A Guide to HIPAA for Sysadmins

When you hear about HIPAA -- the Health Insurance Portability and Accountability Act -- it’s usually in relation to an organization getting hit with massive fines for violating it. Every organization that works with protected health information (PHI) is required to follow HIPAA -- known as a covered entity.

Mac/Windows Integration Tips

Mac/Windows Integration Tips

Mac/Windows integration is our next tech topic. For many Windows admins, it can be a struggle to give Mac OS users in their organization the same experience that PC users enjoy. However, both Mac OS and Windows have come a long way in recent years toward providing admins with the tools they need to integrate Macs into Windows environments.

Mac Security Best Practices

Mac Security Best Practices

Mac security --you’ve probably heard the old conventional wisdom that “macOS is more secure than Windows”. We’re not going to argue that point one way or the other in this article. But, there are still ways for bad guys to do bad things to Macs -- and things that you can do to protect against them.

How To Develop A Malware Response Action Plan

How To Develop A Malware Response Action Plan

Malware outbreaks have been in the news lately. Entire companies crippled by serious malware infections. They have paid ransoms to hackers in order to get their data back and their systems online.

Of course, you need to have good antivirus, firewall, and spam filtering solutions in place in order to prevent infections in the first place.

Implementing a Secure Password Policy on a Windows Domain

Implementing a Secure Password Policy on a Windows Domain

After you’ve [decided on a secure password policy] that fits your company’s security needs, it’s time to actually implement your new secure password policy on your network.
On a Windows Active Directory domain, we’ll do this by editing the Default Domain Policy Group Policy Object (GPO). This will enforce the new secure password standards for all user accounts in your domain.

Protect Your Network by Building a Strong Password Policy

Protect Your Network by Building a Strong Password Policy

Passwords are like the keys to your company’s network. Your users use them to log in to computers, access email, and connect remotely via VPN. And just like the key to the front door of your offices, a password in the wrong hands can allow unwanted “visitors” into your network -- where they can steal confidential information, destroy data, and expose your company to liability.