Greetings fellow IT geeks. Today's post is centered around PowerShell and a recent request we had from a client. The Issue So like many companies...
Finding Duplicate UPN’s 2 Domains – Powershell
Hello All I was recently working on a project to migrate users from legacy domain to a primary domain. One of the many challenges is finding...
Blog The Case of NIC Teaming VS Sysprep
Hello again all and I hope everyone had a great set of Holidays! Today I'll be blogging about an incident I ran across with sysprep on a bare metal...
PowerShell Training: Switch Parameter Validation
Summary There are many ways to validate the presence of a [switch] parameter within a PowerShell script or function, but some are definitely better....
Why Can’t we all just get along? AKA Task Sequences vs PowerShell (32/64 bit)
Once Upon A Time.... I was recently in a situation where I needed both 32-bit and 64-bit PowerShell scripts to be able to read/write Task Sequence...
All Recent Posts
Third-Party Cybersecurity Exposure: Top 5 Actions to Safeguard Your Enterprise Risk Management Strategy
In today’s interconnected business environment, third-party relationships are critical to...
The Hidden Dangers of Unauthorized Access: Why Ignoring These 98 Security Measures Puts Your Business at Risk
In the modern enterprise, unauthorized access is one of the most significant...
Enterprise Risk Management: Addressing System Compromise
In today’s hyper-connected digital landscape, system compromise remains one of the most pressing...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.