steve@thesqlguy.com

6 steps to a more secure SQL database

Security is often something people think about only after they have had a problem. Given that the average cost of a data breach is $3.92 million (SecurityIntelligence 2019) and ransomware attacks have increased 97% over the past 2 years (PhishMe 2019), the "if it's not broke, don't fix it" approach can clearly be catastrophic. Here […]

5 (2)

2019-10-07

3,428 reads

Blogs

Database Fundamentals #24: Filtering Data

By

If you’ve been reading these Database Fundamentals posts, you’ve already seen the WHERE clause...

#PowershellBasics: The Windows Powershell icon in the task bar also lets you run Powershell ISE.

By

I don’t know about you, but I like having the tools that I’m likely...

Launching SQL Compare with Context

By

Years ago Redgate Software started some work to link our tools together. I remember...

Read the latest Blogs

Forums

More Network Restrictions

By Steve Jones - SSC Editor

Comments posted to this topic are about the item More Network Restrictions, which is...

Moving from RDL to RDLC files in SSRS

By YSLGuru

For any custom reporting in an accounting software program m,y company uses we have...

Gathering Business Requirements and Determining Database Schemas

By CoolKid40

What is simplest way to go about gathering business requirements and determining database schemas?

Visit the forum

Ask SSC

SQL Server Q&A from the SQLServerCentral community

Get answers

Question of the Day

Another Typo

See possible answers