Author Archives: Jen Bonney

Shark Week: 6 Tips to Secure Your IT Tackle Box

Original article published on VMBlog. Scientists recently dispelled the myth that sharks attack humans because they mistake them for other prey. In fact, sharks can see clearly below the murky waters. But, it’s not as easy for victims of phishing attacks to see what’s lurking behind an attached document or link within an email. Email is the lifeblood of communications for organizations around the world. Among the 296 billion emails sent daily, there are dangerous emails lurking within. A successful email attack...
Read More

How to Set Up Your Supply Chain Management to Comply with Special Publication NIST 800-171 Compliance

If you’re a contractor or sub-contractor to governmental agencies and organizations, you’ve probably heard of the government’s new mandate by the National Institute of Standards and Technology, NIST Special Publication 800-171 titled Protecting Controlled Unclassified Information (CUI) in Nonfederal Information Systems and Organizations. This special publication was created with the objective to protect information and communications technology (ICT) systems operated by the federal government and its contractors from cyber threats and attacks within the supply chain. This mandate was designed to protect sensitive government information from...
Read More

A Day in the Life of an Email

Ever wonder what your emails are up to when they aren’t protected by an endpoint security solution? GigaTrust has created an infographic that illustrates what “a day in the life of an email” actually looks like… and the threats that may occur if emails are not properly protected. Keep this in mind when sending, opening, forwarding and reading the next email to hit your inbox. Like this infographic? Use the below embed code to share. <h3>Share this Image On Your Site</h3><textarea...
Read More

Creating a Custom PowerShell DSC Resource

We’ve been using PowerShell Desired State Configuration (DSC) to automate the deployment of GigaCloud on Azure and on-premises Hyper-V virtual machines. Most of what we do with DSC comes from the open-source, Microsoft-supervised PowerShell DSC modules found on NuGet, and available to see at https://github.com/PowerShell. For some of our configuration tasks, though, we need custom functionality to get things installed and configured. For those, we’ve created DSC resources using PowerShell. The Script resource If you’re familiar with DSC, you’ll know about...
Read More

Prevent IT Security Breaches In Federal Government Environment with Cloud Collaboration Service

You don’t have to be an “insider” to know about all the IT security breaches that have affected the US government in recent years. The IRS was hacked in 2015 and tax records for 330,000 taxpayers were used to collect bogus refunds. More recently, the Russian hacker Rasputin has breached a total of 63 US and UK universities and US government agencies. Not to mention the 2016 DNC hack that involved the leak of 19,252 emails and 8,034 attachments that...
Read More

Creating a new forest and multiple domain controllers with PowerShell DSC

We’re continuing our series on automating the installation of GigaCloud using PowerShell DSC. GigaTrust is creating a fully automated solution to set up and install GigaCloud™ in whatever configuration our customers want: on-premises in Hyper-V and VMWare, in their own cloud subscriptions using Microsoft Azure, and even fully managed by GigaTrust as Software as a Service (SaaS). GigaCloud is deployed as a virtual appliance, with required services deployed across multiple virtual machines to provide redundancy and scale. To keep the...
Read More

Unstructured Data Sharing Is the Key to Ensure Productivity

Can we talk…candidly? If our question stopped at “Can we talk?” we’d be referring to the humorous hallmark catchphrase of Joan Rivers, one of the world’s top comedians. But when we add the word “candidly,” the humor evolves into the harsh reality for over billions of corporate and government email users worldwide who need to have digital candid conversations with employees, supply chain partners and other external participants, while maintaining privacy. Are you able to have a candid email conversation...
Read More

Applying Unattend.xml files using Desired State Configuration

GigaTrust™ is creating a fully automated solution to set up and install GigaCloud™ in whatever configuration our customers want: on-premises in Hyper-V and VMWare, in their own cloud subscriptions using Microsoft Azure, and even fully managed by GigaTrust as Software as a Service (SaaS). Because GigaCloud is based on Microsoft’s Rights Management Services, we need a number of servers installed in a scalable, redundant fashion, running services including Active Directory Domain Services, Rights Management Services, Windows Software Update Service, Active...
Read More

Keeping the Secret Recipe Safe: Why John Podesta’s Risotto Matters to Security Professionals Everywhere

The right ingredients for improved email protection are essential, now more than ever If you add ¼ to ½ cup of liquid at a time—you can get creamy risotto. How do we know this secret? The same way everyone in the world knows. John Podesta’s private email account was victim of a hack and data breach. It started with a spear phishing email sent to the Chairman of the Clinton Campaign’s DNC email account on March 19, 2016. It’s the...
Read More

Automating GigaCloud Installation with Azure Resource Manager and PowerShell Desired State Configuration

GigaTrust has invested years of effort into creating GigaCloud, our fully managed offering to help our customers protect their email and documents, in-use and at-rest. Up until now, installing GigaCloud has been a manual process involving multiple machines running Windows Server with various roles and cluster configurations. Starting from scratch, this installation can take a full day or more, with pages and pages of instructions to follow, and lots of configuration tasks that are detailed and error-prone. When a problem...
Read More