Latest Posts

Five worthy reads: Preparing an incident response plan for the pandemic and beyond

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. With the rising concern over cyberattacks in the distributed workforce, this week we explore the concept of cybersecurity incident response during

General 3 min read Read

Uptime monitoring: A boon for your business

A highly functional IT network is the basis of any successful modern business, and for effective operations, organizations must monitor the health and availability of all their IT infrastructure components and ensure they’re up and running 24×7.

Uptime is the …

OpManager 3 min read Read

10 network tools every IT admin needs

Advanced Network Tools

Remember when native commands like ping and ipconfig were adequate for network inspection? With networks becoming more dynamic, these generic tools don’t seem to make the cut anymore. IT admins are in a constant quest for ad hoc network tools

OpUtils 3 min read Read

Sophisticated phishing

Most of us can think of a time when we received a phishing email. In fact, most phishing emails are easy to identify, and automatically go to spam.

However, in this ongoing pandemic, hackers are adopting advanced tactics that cleverly …

General 3 min read Read

6 top risk factors to triage vulnerabilities effectively

Look beyond CVSS scores

Common Vulnerability Scoring System (CVSS) scores have been viewed as the de facto measure to prioritize vulnerabilities. Vulnerabilities are assigned CVSS scores ranging from one to 10, with 10 being the most severe. However, they were never intended as a …

Vulnerability Manager Plus 4 min read Read

Prepare your IT network to adapt to the dual workforce model [Virtual seminar]

In the wake of COVID-19, organizations around the world have established a new norm in working remotely. Many organizations barely had a contingency plan when they were bowled over by this sudden shift, leaving security and IT admins frazzled while …

General 1 min read Read

Dealing with data glut: Why ROT data is an issue, and how to manage it

“Unstructured data accounts for as much as 80 percent of an organization’s data footprint.” – Gartner

As file storage grows rapidly year after year, new challenges arise around keeping data safe and maintaining control over data storage systems.

Who owns …

DataSecurity Plus 3 min read Read

Domain controller patch alert! Vulnerability grants domain admin access in 10 seconds

A critical Active Directory vulnerability (CVE-2020-1472)   has been making headlines for being the most notorious elevation of privilege bug because it can affect all computers and domain controllers in an organization.

 This high-risk vulnerability, dubbed Zerologon, gives threat actors …

Log360 4 min read Read

ManageEngine Positioned in the 2020 Gartner Magic Quadrant for IT Service Management Tools

ServiceDesk Plus, ManageEngine’s flagship IT service management (ITSM) solution, has been named a Niche Player in this year’s Gartner Magic Quadrant for IT Service Management Tools.

The Magic Quadrant offers insights for organizations shopping for an ITSM tool for their …

General 2 min read Read