Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about hyperscale data centers, including how they function, and the considerations and challenges organization face in …
Latest Posts

Adopting a BYOD policy amid the COVID-19 era
In the midst of the COVID-19 pandemic, even companies that had said no to BYOD have come to terms with it, as a fair share of remote work would not even be possible without such a policy. Pandemic or no …

Deploy (or defer) your macOS 11 Big Sur update with Desktop Central

A new iOS update, macOS 11 Big Sur, has been released, and it includes several exciting new features. As with most Apple OS upgrades, some users will want to install it immediately, but organizations might want to delay its …
Five ways to hack MFA, and the FBI’s mitigation strategy [E-book]

Advances in technology have led to the creation of multiple data security methods that help organizations secure sensitive data from the prying hands of attackers. Of these, multi-factor authentication (MFA) is one of the most important security measures adopted by …

How to secure your network from a Ryuk ransomware attack
Universal Health Services (UHS), a Fortune 500 company and healthcare services provider, has reportedly shut down systems at facilities throughout the United States after the Ryuk ransomware hit its network on September 27, according to an article on the Health …

CISA’s recommendations to recognize and avoid email scams [E-book]

Email has always been a popular tool for business communications. Unfortunately, it is also one of the weakest links in an organization’s security strategy. 94 percent of all cybersecurity incidents originate from emails.
As organizations all over the world have …

Vabi gains total visibility into its network using OpManager and Firewall Analyzer

Vabi is a Netherlands-based company that provides “real estate data in order, for everyone.” Since 1972, the company has focused on making software that calculates the performance of buildings. Nine out of 10 utility buildings in the country have been …
Avert cyberattacks against MFA using FBI-recommended countermeasures [Webinar]

With the rise of remote work, multi-factor authentication (MFA) has become more essential than ever. MFA can be used to protect authentications happening on different resources like workstations, VPNs, and enterprise applications. MFA effectively stops credential-based attacks, as it requires …

