Community Circle
Search this blog
Steve’s tweets
- RT @JamesMcG_MSBI: T-SQL Tuesday #134: ROUNDUP - GIVE ME A BREAK! Thanks to everyone who contributed to #tsql2sday. I had so much fun host… 4 hours ago
- @gbargsley @sqlstudent144 Ugh, I hope this is easier for you than me. Wear a mask. I've had a lot of friends who ha… twitter.com/i/web/status/1… 4 hours ago
- Renaming Files by Padding Numbers with PowerShell voiceofthedba.com/2021/01/18/ren… 5 hours ago
The Current Book
MVP Award
Tags
- administration
- AI
- auditing
- Azure
- backup
- Backup/Recovery
- blogging
- business
- career
- career
- cell phone
- Cloud Computing
- containers
- continuous delivery
- continuous integration
- coping
- data
- data analysis
- database design
- databases
- Database Weekly
- data privacy
- dbatools
- DevOps
- disaster recovery
- DLM
- encryption
- Friday Poll
- GDPR
- Git
- goals
- hardware
- high availability
- Humor
- life
- Linux
- mcm
- Microsoft
- misc
- monitoring
- networking
- NoSQL
- PASS
- patching
- Performance
- powershell
- presentations
- Redgate
- republish
- sabbatical
- security
- software development
- software development
- speaking
- SQL Change Automation
- SQL Clone
- SQL Connections
- SQL in the City
- SQLNewBlogger
- SQL Prompt
- SQL Saturday
- sql server
- SQLServerCentral
- SSMS
- syndicated
- T-SQL
- T-SQL Tuesday
- testing
- travel
- tsqlt
- vacation
- version control
- webinar
- windows
- work
Tag Archives: security
Default Credentials
Years ago I got a call to help someone with a database. I walked over to their desk (when this was possible) and sat down. They asked me how they could get into a database they had been told about. … Continue reading
Security in the Aftermath
Not too long ago was a very sad and embarrassing day for the US. The US capital was breached and rioters had hours inside without authorities. Ignoring the reasons and politics behind the event, think about the security of the … Continue reading
The Best Way to Protect Sensitive Data
I was listening to someone talk about data privacy recently, and the ways that you can protect the sensitive information in your databases. They had a great quote about something you might consider. They said, “The best way to protect … Continue reading
A Need for Monitoring without Administration
There was a report recently that a number of US government agencies were hacked through a network management system. Apparently Solarwinds had their code hacked, and this resulted in a backdoor being distributed to customers via software updates. There is … Continue reading