The Vital Role Standards Play in Ag Cybersecurity
ZAG discusses cyber standards with Johnny McGuire at ProduceSupply.org (and IT Director at …
Cyber Awareness Month: Our Mission in Protecting the Nation’s Food Supply
As we begin Cybersecurity Awareness Month, ZAG is focused on protecting the nation's food supply from cyberattacks and …
Thursday, June 9
Ag Executive Cyber Briefing – June 2022
To help protect Ag businesses during harvest, we're holding an Executive Cyber Briefing event for industry leaders in …
Thursday 9 June
Seminar | Cyber Insurance
Cyber insurance rate hikes are affecting businesses everywhere, but there are other trends that IT leaders need to know …
World Password Day: Are You Following Best Practices?
As we celebrate World Password Day, ZAG wants to highlight some best practices for using passwords across your …
Thursday 28 April
Seminar | Cyber Incident Reporting Act
Learn about the methods hackers use to infiltrate a technology system and the red flags that might trigger a response …
Thursday 17 March
Seminar | Anatomy of a Cyberattack
Learn about the methods hackers use to infiltrate a technology system and the red flags that might trigger a response …
Get Ready For the Deprecation of Microsoft Basic Authentication
How to navigate the change to ensure the best possible protection for your …
Verify and Validate Email Security With These Best Practices
Follow these basic steps to help reduce your vulnerability to attacks across your …
Is Email a Powerful Communication Tool or Open Door for Security Disaster?
It's never been more important to protect your organization from threats via email. Here's …
How to Reduce the Risk of Project Failure with Improved Communication
Best practices for ensuring project success through improved communication …
Backups Are For Show, Restores Are For Job Security
Five critical questions to ask about your SQL database backups and restores in the event of an IT …
Disaster Recovery Testing: The Importance of Documenting and Testing your Plans
A disaster recovery plan is essential to your company returning to normal operations after a critical incident. Here's …
The Difference Between RPO & RTO and Why It Matters
With every second costing money, the ability to bring your business back up and running quickly is a crucial …
It’s Not a Disaster Recovery Plan if It’s Written After a Disaster!
A disaster recovery plan can be the difference between a speedy recovery and costly …
Active Directory Administrator Security Best Practices
The three critical tasks every Active Directory admin should do to secure their AD …
Why Passphrases Should Replace Passwords in your Security Toolbox
As cyberattacks become more sophisticated, simple passwords not longer cut it. It's time for …
Managing Local Administrator Account Passwords in Active Directory
Get out of the password management business and secure your Active Directory with the Microsoft LAPS …
How To Cleanup Stale Data in Active Directory
We share 5 best practices to prevent intermittent and difficult-to-diagnose issues in your AD …
Active Directory Standards
Here's a quick and easy checklist to make sure your Active Directory is set up to maximize success and …