IT Security | April 8, 2020IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck] The definition of an “attack” is changing. The level of complexity and technical expertise...
General | April 8, 2020File shadowing: The key to a swift recovery from USB and file-based attacks USB devices are undeniably valuable, but they can be dangerous. On one hand, they are...
IT operations management and observability | April 7, 2020Ensuring your web applications offer an ideal user experience while working from home While the recent pandemic has removed much of the traffic from the roads, it has led to an...
General | April 6, 2020COVID-19: Remote patch management struggles and solutions to secure remote users Crisis or not, keeping endpoints patched against known and emerging vulnerabilities...
General | April 2, 2020Best practices to ensure data security while working remotely Coronavirus has disrupted daily life for so many around the world in a shockingly short...
IT operations management and observability | April 2, 2020Have you modified your network configs for remote workers? Keep track of and manage changes. By now, we're all fairly aware that the ongoing crisis has changed the way people work....
IT Security | April 1, 2020The rise in cyberattacks surrounding the COVID-19 pandemic Fear, uncertainty, and doubt are powerful emotions, and time and again, hackers attempt to...
Remote Access Plus | April 1, 2020Five reasons why Remote Access Plus is your comprehensive solution for supporting remote workers Remote work has been on the rise since 2005 and has seen over 159 percent growth in the...
Firewall Analyzer | March 30, 2020How VPN bandwidth monitoring helps retain remote workforce productivity The COVID-19 outbreak has brought businesses around the globe to their knees. To survive...
General | March 27, 2020Remote work: Being productive in a pandemic With coronavirus (COVID-19) wreaking havoc across the globe, its disastrous effects are...
General | March 23, 2020Introducing our free Secure Remote Access Toolkit for IT teams The global corporate landscape is on the brink of a complete premises lockdown in light of...
Log360 | March 23, 2020Why log archival is important for network security Network devices like workstations, servers, routers, and firewalls generate a large volume...