Latest Posts

IT service management’s ever-changing landscape

It’s easy to see that the IT service management (ITSM) landscape is changing quickly. In 2017, Forbes surveyed over 250 senior-level executives from varied industries and job functions to get insight into the state of the ITSM industry. Forbes found …

Desktop Central 2 min read

Microsoft Patch Tuesday March 2018 updates 

Patch Tuesday March 2018

Compared to March 2017, this month’s Patch Tuesday is rather tame. This time last year, Microsoft was releasing patches for a number of zero-day vulnerabilities, including the EternalBlue, EternalSynergy, EternalRocks, and DoublePulsar vulnerabilities that the Shadow Brokers went on to …

Desktop Central 2 min read

Talk to our experts about the essentials of log management

Log management is a pillar of security information and event management (SIEM), and is critical to any organization’s security strategy. Logs document every event that occurs on your network, and therefore have the power to inform you about various security …

EventLogAnalyzer 2 min read

AlarmsOne introduces two-way tracking of alarms and tickets

AlarmsOne already has built-in integrations with SaaS-based help desk tools such as ServiceDesk Plus On-Demand, Zendesk, and Zoho Desk to help IT management and help desk teams stay on the same page.

However, this simple, outbound integration had a drawback. …

AlarmsOne 1 min read

Tracking Group Policy changes: Why you should look beyond native auditing

Group Policy is undoubtedly one of the most powerful features of Active Directory. It renders administrators a secure and stable platform to establish and manage settings for users and computers. So, whether it’s inadvertent or deliberate, changes in the Group …

Active Directory 1 min read

ADManager Plus’ Active Users report for Sarbanes-Oxley (SOX) audit

In this blog, we’ll discuss how to generate an Active Users report for SOX audits with a single click using ADManager Plus’ custom reports. In parts (A), (C), and (D) under Section 302(a)(4) of the SOX Act, it’s required that …

Active Directory 2 min read

University of Northern Colorado’s response to cybersecurity breach exemplifies GDPR compliance

Another day, another cybersecurity breach. The University of Northern Colorado (UNC) has reported that the personal information of 12 of its employees was compromised in a cybersecurity breach. UNC’s police department is looking into the breach and, at this time, …

ManageEngine 2 min read

uTorrent vulnerability: Another reason to blacklist unnecessary third-party software

uTorrent Vulnerability

Security vulnerabilities have become headline news, and not just in the IT world. A crucial vulnerability in popular downloading software uTorrent is one of the latest cybersecurity stories.

Tavis Ormandy, a Google Project Zero researcher, found remote code execution vulnerabilities

Desktop & Mobile 2 min read

Five worthy reads: Blockchain—How one phenomenal innovation is impacting the world

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we highlight blockchain’s huge potential to disrupt the digital sphere.

 Blockchain—How one phenomenal innovation is impacting the world

I’ve always wondered how my parents perceived my growth …

ManageEngine 3 min read

Gold Lowell uses SamSam ransomware to terrorize SMBs

From late December 2017 to mid January 2018, several small and medium businesses found themselves the victims of SamSam ransomware, in attacks propagated by the Gold Lowell cybercrime gang. This campaign has made the group $350,000 richer.   

The Gold Lowell

IT Security 2 min read