Change layout
Windows Server Hardening

Windows Server Hardening Checklist

Windows Server Hardening Checklist

What is server hardening? There are many different ways for a hacker to attack a Windows server, from unpatched system vulnerabilities to misconfigured settings, unnecessary protocols, or vulnerable applications. The process of getting these vulnerabilities closed off or patched (or at least most of them) is server hardening Continue reading

default featured image

MSP Voice Episode 8: Kevin Bissinger

MSP Voice Episode 8: Kevin Bissinger

In the 8th episode of MSP Voice, we are joined by Kevin Bissinger from Dentek Systems, Inc.

Dentek Systems, Inc. (DSI) was founded in Richardson, Texas circa 2002 as a turnkey Information Technology and Audio/Video solutions provider. They offer an array of services and support for new and existing small to mid-size companies. Continue reading

Don’t miss new articles!
Thank you for subscribing!
AWS databases services comparison

RDS vs Redshift vs DynamoDB vs SimpleDB: AWS Database Services

RDS vs Redshift vs DynamoDB vs SimpleDB: AWS Database Services

Cloud database platforms are considered to be some of the best solutions in the world of cloud computing. While there are many reasons why they are exceedingly popular, high accessibility and security, plus dynamic flexibility are some of the principal benefits that come with cloud database systems. You don’t even have to worry about maintenance, hardware, or patching. Continue reading

Cloud Certifications Guide

Cloud Certifications Guide: AWS vs. Azure and More

Cloud Certifications Guide: AWS vs. Azure and More

Where can you find cloud certifications? If you choose to get a cloud certification, should you obtain one from a certain cloud vendor -- such as AWS or Azure -- or should you pursue a general-purpose cloud certification? Which categories of cloud computing certifications are available currently? Keep reading for an overview of the main cloud computing certifications available today. Continue reading

OS Hardening

OS Hardening vs. Data Protection. You Need Both Cybersecurity Features

OS Hardening vs. Data Protection. You Need Both Cybersecurity Features

Unsecured OS provides the same level of security as opened gates (and lack of walls) in the castle. Being the king, you would definitely want walls as high as mountains, ditch deep enough to drown in and some hungry crocodiles in that ditch. And, yep, the gates being closed. In this article, we are discussing the ways to harden the operating system and offer you a system hardening checklist. Don't forget to make notes and audit your systems. Continue reading

default featured image

MSP Voice Episode 7: Jeff Huber from Five Nines Tech

MSP Voice Episode 7: Jeff Huber from Five Nines Tech

In this episode of MSP Voice, we are joined by Jeff Huber from Five Nines Tech, California. Jeff has been in the industry for over 30 years since he was 19. He says that despite the lack of entrepreneurial spirit he decided to take over the Five Nines Tech, he was managing for a while. Learn more in the 7th episode of MSP Voice!

Continue reading

Load more