IT’S OFFICIAL: Windows Server 2022 preview is now available for download. So what has changed? To some, not much, but anyone deploying to the cloud…
RecordTS v6 now boasts a new recorder designed from the ground up to work with Microsoft Azure Windows Virtual Desktops. It is protocol agnostic and…
What is it? Data theft is the act of stealing information stored on computers, servers, or other devices from an unknowing victim with the intent…
Avoid Phishing Phishing has gotten increasingly sophisticated, sending tech-savvy people ostensibly legitimate links and pop-up ads. Don’t email any sensitive information unless you are sure…
NFTs & Cybersecurity With NFTs continuing to make headlines as the latest cryptocurrency trend, their vulnerabilities in cyberspace are also making news. Below we explore…
Employee Monitoring: The Ethics & the Law Employee Computer Monitoring: The Ethics and the Laws In the United States & Europe Employee Monitoring: Ethics &…
A cybersecurity compliance audit on the horizon can strike fear in the hearts of company executives, and their IT personnel. And why wouldn’t it be?…
The 11 Biggest Data Breaches of 2020 Since the COVID-19 pandemic has forced companies to move their business to remote operations, there has been a…
Today I found a simple DOS command to find the last time a Windows machine was rebooted: C:\> systeminfo | Find “System Boot Time” Returns:…