Password Manager Pro | September 5, 2017Begin your GDPR journey with privileged access managementThe core of the GDPR is all about data protection; specifically, securing EU citizens' personal data. However, the GDPR does not explicitly state how...
General | September 1, 2017Support your end users, not your softwareITSM is in a period of rapid change, that much is for sure. But with so much changing, it's important to stay...
Identity and access management | August 31, 2017Ransomware basics: Part 2In our first installment, we discussed the importance of backing up your data. Without a good backup, chances...
RecoveryManager Plus | August 30, 20175 shortcomings of native Active Directory backup and recovery toolsMicrosoft's Active Directory (AD) is a key network service in many organizations; without it, those...
EventLog Analyzer | August 28, 2017Getting to know the GDPR: The technical and organizational measuresBefore we jump into the third part of this GDPR blog series, let's take a moment to think...
Endpoint Central | August 25, 2017Using Foxit Reader? You might be vulnerable to network breaches Cybersecurity and cyberattacks have become prominent topics lately. No matter how much...
Identity and access management | August 24, 2017Ransomware basics: Part 1There are many articles on ransomware. Many are trying to convince you that if you buy the...
ServiceDesk Plus MSP | August 23, 2017ServiceDesk Plus MSP 9.3 : Better dashboards, project templates, and moreServiceDesk Plus MSP is bringing some highly anticipated features to your service desk....
Active Directory Free tools | August 22, 2017What do the phrases qwerty, password, and 123456 have in common?They're all weak passwords! Not only are these passwords predictable, they also top the...
ServiceDesk Plus | August 18, 2017[Free webinar] ITSM metrics vs ITSM analytics: What it takes to connect the dots in your IT support Lost business hours, change success rate, first call resolution rate, and SLA compliance...