
The Vital Role Standards Play in Ag Cybersecurity
ZAG discusses cyber standards with Johnny McGuire at ProduceSupply.org (and IT Director at …

Grower Shipper Packer
This farmer-owned grower, packer, and shipper of premium fresh vegetables worked with ZAG to upgrade its …

Cyber Awareness Month: Our Mission in Protecting the Nation’s Food Supply
As we begin Cybersecurity Awareness Month, ZAG is focused on protecting the nation's food supply from cyberattacks and …

MSP Contract Ending? 3 Signs It Might Be Time for a New Provider
When your MSP is struggling to provide these 3 functions, here's your guide to what's …

World Password Day: Are You Following Best Practices?
As we celebrate World Password Day, ZAG wants to highlight some best practices for using passwords across your …

How to Find a Managed Service Provider That Does More for Your Business
Here are 3 things your current provider should offer as part of your service …

Get Ready For the Deprecation of Microsoft Basic Authentication
How to navigate the change to ensure the best possible protection for your …

Verify and Validate Email Security With These Best Practices
Follow these basic steps to help reduce your vulnerability to attacks across your …

Is Email a Powerful Communication Tool or Open Door for Security Disaster?
It's never been more important to protect your organization from threats via email. Here's …

How to Reduce the Risk of Project Failure with Improved Communication
Best practices for ensuring project success through improved communication …

Backups Are For Show, Restores Are For Job Security
Five critical questions to ask about your SQL database backups and restores in the event of an IT …

Disaster Recovery Testing: The Importance of Documenting and Testing your Plans
A disaster recovery plan is essential to your company returning to normal operations after a critical incident. Here's …

Maintaining Critical IT NMS Infrastructure Tools
How an NMS helps manage network systems and services, generate tickets, and isolate and escalate …

How to Successfully Plan IT Backup and Restoration for Disaster Recovery
When disaster recovery planning, start with a three-step approach for systems backup and …

It’s Not a Disaster Recovery Plan if It’s Written After a Disaster!
A disaster recovery plan can be the difference between a speedy recovery and costly …

Active Directory Administrator Security Best Practices
The three critical tasks every Active Directory admin should do to secure their AD …

Why Passphrases Should Replace Passwords in your Security Toolbox
As cyberattacks become more sophisticated, simple passwords not longer cut it. It's time for …

Managing Local Administrator Account Passwords in Active Directory
Get out of the password management business and secure your Active Directory with the Microsoft LAPS …

How To Cleanup Stale Data in Active Directory
We share 5 best practices to prevent intermittent and difficult-to-diagnose issues in your AD …

Active Directory Standards
Here's a quick and easy checklist to make sure your Active Directory is set up to maximize success and …