Defend Your Active Directory Throne
Hackers are coming. The army of White Walkers targeting Westeros grows larger by the day. The Wall, once thought of as being a strong enough ward against the White Walkers, has been breached. Endless ...

Hackers are coming. The army of White Walkers targeting Westeros grows larger by the day. The Wall, once thought of as being a strong enough ward against the White Walkers, has been breached. Endless ...
Wouldn’t it be great if you could set up your IT environment in just the right way to ensure ongoing security and regulatory compliance? You’d put your firewalls and antivirus protection in place, ens...
If you’re attending Microsoft Ignite in Orlando, it’s about that time to dive into the MyIgnite Schedule Builder to select the sessions you want to attend. Here’s one Active Directory best practices s...
We’re headed back to Orlando this September 24-28 for the Microsoft Ignite Conference 2018 and we’re excited to bring our new colleagues from Metalogix! That’s right. If you haven’t heard, Quest rece...
You are probably aware that cyber attacks are increasing dramatically every year, but have you actually looked at the numbers? They are truly staggering. For example, Symantec’s 2018 Internet Security...
The General Data Protection Regulation (GDPR) came into effect on May 25. Are you prepared for the new legislation? It can be challenging knowing where to start when planning for compliance, but the ...
With organizational adoption of Office 365 on the fast track, SharePoint has become the leading collaboration platform for organizations of all sizes. Our recent acquisition of Metalogix adds the need...
Do you remember when Microsoft introduced the Active Directory Recycle Bin, way back in Windows Server 2008 R2? It was a huge advance, eliminating the need to perform an authoritative restore to recov...
My three earlier posts in this series paint a pretty bleak picture of the healthcare industry: Despite the wide variety of compliance regulations on the books around the world, healthcare organizatio...
In my previous post , I explained 6 key reasons why healthcare organizations are particularly vulnerable to cyber attacks. Today, let’s explore exactly what these attacks are designed to do, and how t...
In my previous blog posts, I gave two examples of a privileged user could easily hose your Active Directory: by changing deny logon rights and by erasing the DNS entries on a domain controller. You mi...
In my previous post, I reviewed the primary compliance regulations that healthcare organizations around the world are subject to, all of which are intended to improve data protection in healthcare. Bu...