Jonathan Hassell

Contributing Writer

Jonathan Hassell runs 82 Ventures, a technical writing and consulting firm based in Charlotte, N.C.

What are shielded virtual machines and how to set them up in Windows Server

Build an ultra-secure Microsoft Exchange Server

Build an ultra-secure Microsoft Exchange Server

Yes, it's possible to do a Microsoft Exchange Server deployment that is secure enough for all but the most sensitive information. Here's how to do it.

How to prevent data loss with Windows Information Protection

How to prevent data loss with Windows Information Protection

Looking for a solution to keep company data out of the wrong hands? Windows 10's WIP might be the best option. Here's how WIP works.

Fighting ransomware: A fresh look at Windows Server approaches

Fighting ransomware: A fresh look at Windows Server approaches

Make sure your backup files really work -- test them! -- or else they will be no use to you in this situation.

Make your emails more trusted with DKIM

Make your emails more trusted with DKIM

There are authentication systems -- DomainKeys and its successor DKIM -- that try to mitigate some of the risk of trusting that emails are actually from who they say they are from.

Lessons from high-profile IT failures

Lessons from high-profile IT failures

What we can learn about disaster recovery and high availability from recent airline outages.

Constructing a solid backup plan with Microsoft Azure Backup

Constructing a solid backup plan with Microsoft Azure Backup

Here's how to create both local and cloud-based backups with this 'surprisingly good' software, and why it’s a good idea, at least for Microsoft-heavy shops.

A look inside the Microsoft Local Administrator Password Solution

A look inside the Microsoft Local Administrator Password Solution

Finally, a way around the problem of administrator passwords that are identical across machines, just waiting to be scooped up in pass-the-hash-attacks.

Disaster recovery in a DevOps world

Disaster recovery in a DevOps world

Organizations that are adopting DevOps methodologies are realizing actual benefits from taking that approach.

You’ve been hit with ransomware. Now what?

You’ve been hit with ransomware. Now what?

When their data has been stolen, and is being held hostage, companies are increasingly caving in to cybercriminal demands for payment. Short of paying up, the best defense is a good offense.

What is blockchain and how does it work?

What is blockchain and how does it work?

Bitcoin exploded on to the world’s stage in 2012 as a currency backed by everyone and controlled by no one. But what exactly makes it work from a technology standpoint?

Why CIOs should worry about the Internet of Things

Why CIOs should worry about the Internet of Things

The Internet of Things brings with it the promise gee-whiz applications and life-changing innovation. But one thing’s for sure – there are as many questions as there will be gigabytes of data being poured into your data centers.

Load More