Articles by

Jeff Petters

What is FISMA Compliance? Regulations and Requirements

FISMA stands for the Federal Information Security Management Act, which the United States Congress passed in 2002: it requires federal agencies to implement information security plans to protect sensitive data....

Read More

Active Directory Domain Controller (AD DC) Could Not Be Contacted [SOLVED]

When your users report that they see “an active directory domain controller for the domain could not be contacted” there could be a few different causes for this issue. Most...

Read More

Active Directory Users and Computers (ADUC): Installation and Uses

Active Directory Users and Computers (ADUC) is a Microsoft Management Console snap-in that you use to administer Active Directory (AD). You can manage objects (users, computers), Organizational Units (OU), and...

Read More

Active Directory Domain Services (AD DS): Overview and Functions

Active Directory Domain Services (AD DS) are the core functions in Active Directory that manage users and computers and allow sysadmins to organize the data into logical hierarchies. AD DS...

Read More

Group Policy Editor Guide: How to Configure and Use

The Group Policy Editor is a Windows administration tool that allows users to configure many important settings on their computers or networks. Administrators can configure password requirements, startup programs, and...

Read More

Windows Defender Turned Off by Group Policy [Solved]

Picture this scenario: You log into your computer on any random Thursday, and Windows Defender won’t start. You manually kick it off, and you get the message “Windows Defender is...

Read More

Right to be Forgotten: Explained

The “Right to be Forgotten” (RTBF) is a key element of the new EU General Data Protection Regulation (GDPR), but the concept pre-dates the latest legislation by at least five...

Read More

What is DNS, How it Works + Vulnerabilities

The Domain Name System (DNS) is the internet’s version of the Yellow Pages. Back in the olden times, when you needed to find a business’ address, you looked it up...

Read More

What is PCI Compliance: Requirements and Penalties

PCI compliance is a set of standards and guidelines for companies to manage and secure credit card related personal data. The major credit card companies – Visa, Mastercard, and American...

Read More

What is an SMB Port + Ports 445 and 139 Explained

The SMB protocol enables “inter-process communication,” which is the protocol that allows applications and services on networked computers to talk to each other – you might say SMB is one...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.