Latest Posts

Five worthy reads: Hyperscale: The path ahead for data centers and organizations

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about hyperscale data centers, including how they function, and the considerations and challenges organization face in

General 3 min read Read

Adopting a BYOD policy amid the COVID-19 era

In the midst of the COVID-19 pandemic, even companies that had said no to BYOD have come to terms with it, as a fair share of remote work would not even be possible without such a policy. Pandemic or no …

Mobile Device Manager Plus 3 min read Read

Deploy (or defer) your macOS 11 Big Sur update with Desktop Central

Big Sur with Desktop Central

A new iOS update, macOS 11 Big Sur, has been released, and it includes several exciting new features. As with most Apple OS upgrades, some users will want to install it immediately, but organizations might want to delay its

Desktop Central 2 min read Read

Five ways to hack MFA, and the FBI’s mitigation strategy [E-book]

MFA-Ebook-2

Advances in technology have led to the creation of multiple data security methods that help organizations secure sensitive data from the prying hands of attackers. Of these, multi-factor authentication (MFA) is one of the most important security measures adopted by …

ADSelfService Plus 2 min read Read

How to secure your network from a Ryuk ransomware attack

Universal Health Services (UHS), a Fortune 500 company and healthcare services provider, has reportedly shut down systems at facilities throughout the United States after the Ryuk ransomware hit its network on September 27, according to an article on the Health

IT Security 4 min read Read

CISA’s recommendations to recognize and avoid email scams [E-book]

Email has always been a popular tool for business communications. Unfortunately, it is also one of the weakest links in an organization’s security strategy. 94 percent of all cybersecurity incidents originate from emails.

As organizations all over the world have …

Exchange Reporter Plus 1 min read Read

Vabi gains total visibility into its network using OpManager and Firewall Analyzer

Vabi is a Netherlands-based company that provides “real estate data in order, for everyone.” Since 1972, the company has focused on making software that calculates the performance of buildings. Nine out of 10 utility buildings in the country have been …

OpManager 2 min read Read

Avert cyberattacks against MFA using FBI-recommended countermeasures [Webinar]

MFA-Hacks-webinar2

With the rise of remote work, multi-factor authentication (MFA) has become more essential than ever. MFA can be used to protect authentications happening on different resources like workstations, VPNs, and enterprise applications. MFA effectively stops credential-based attacks, as it requires …

ADSelfService Plus 2 min read Read

Solve storage monitoring woes with OpManager

Data in your enterprise organization doubles almost every year, and data multiplication at this pace requires boosting your storage capacity. But when the magnitude of data size increases, latency or performance lags are inevitable.

You can outsource your storage infrastructure …

OpManager 3 min read Read