Latest Posts

Ransomware: How attackers weaponize Active Directory, and what defense measures can stop them [Free e-book]

Ransomware attacks continue to rattle organizations across the globe. Especially worrisome is the fact that many of them are exploiting Active Directory (AD), a crucial technology that forms the very foundation of most of today’s IT environments.

Access to an …

AD360 2 min read Read

WWDC21 update: macOS 12 Monterey is here with features that can simplify your life as an admin

 

The iOS, iPadOS, and tvOS 15 updates released last month provided some noteworthy improvements to security and privacy while introducing new features. macOS 12 Monterey, which released on October 25, is also following a similar trend. Let’s take a …

Desktop Central 2 min read Read

Five worthy reads: Preparing for AI adoption amidst a serious skills shortage

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In the era of mass AI adoption, aimed at enabling disruptive technology innovations, this week we will explore the concern …

ManageEngine 3 min read Read

Microsoft’s shared responsibility model: Who should back up Azure AD and Microsoft 365 data? [E-book]

 

Use of Azure AD and Microsoft 365 has steadily increased over the past few years, and the adoption rate has skyrocketed due to the COVID-19 pandemic. While Microsoft focuses on providing users with nearly 100% uptime, the shared responsibility …

RecoveryManager Plus 1 min read Read

The Colonial Pipeline hack uncovered: FBI- and CISA-recommended security measures

The Colonial Pipeline ransomware attack is potentially one of the worst cyberattacks to have happened this decade. A hacker group known as DarkSide stole nearly 100GB of data from the Colonial Pipeline servers before locking them down and demanding a …

General 2 min read Read

Shared iPads at work: How MDM helps you get the most out of them

For organizations to know that iPads can now be used as shared devices in different industries.Many organizations allow their corporate devices to be shared by different employees, or hand them out to teams or departments on a rotating basis. Healthcare providers, logistics companies, retailers, and schools often deploy mobile devices that are shared to ease …

Mobile Device Manager Plus 3 min read Read

ManageEngine captures top honors at GovTech Innovation Awards 2021

ManageEngine captured the Network Management & Monitoring Vendor of the Year honor at the GovTech Innovation Awards 2021 conducted by Tahawul Tech. Elitser Technologies, a regional distributor for ManageEngine, accepted the award on behalf of ManageEngine on September 27 in …

ManageEngine 2 min read Read

Watch out for tenants living off your land

The cyberworld has witnessed and defended against several forms of attacks. Some of the most common ones known to disrupt a network include credential stealing, malware installations, worms and viruses, and insider threats. In order to execute these attacks successfully, …

IT Security 3 min read Read

Network monitoring tools: The good, the bad, and the ugly

For organizations that rely on their network to support their daily operations, how well the network operates can make or break their business. As a network admin, your core objective is to ensure that day-to-day business operations are carried out …

General 6 min read Read