Latest Posts

Top five tips for Office 365 security and compliance, Part 1

Office 365 is a favorite target for hackers across the globe. Of all the messages sent to Office 365 inboxes in a single month, about 55 billion are spam or bulk emails, and 20 million contain some form of malware. …

General 1 min read

Five worthy reads: The 5G digital metamorphosis 

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore how the impending 5G wave will impact businesses. 

The next generation of cellular networks, 5G, is finally …

ManageEngine 3 min read

Are your systems still running an old Windows OS? It’s time to move to Windows 10

In less than 20 months, Windows 7 will reach end-of-life status, putting many administrators under a lot of pressure to get their systems up to date with the latest Windows OS. Microsoft will still offer support for Windows 7, but …

Desktop Central 2 min read

Halloween NCSAM contest for IT security experts!

With Halloween fast approaching, the search for the scariest costumes is underway. But as an IT security professional, what haunts you more? Coworkers dressed as ghosts, witches, and vampires? Or the thought of a cyberattack?

October may be all about …

General 1 min read

Secure workstations by monitoring and alerting membership changes on Local Administrators Group, Part 1

Imagine you’re an admin in a company that prides itself on its security practices, which includes using firewalls, IDP systems, and IPS systems. You have an employee who is a local administrator with highly sensitive data on their computer. This …

Active Directory 2 min read

Next stop: Oracle OpenWorld 2018!

The Applications Manager team is all set to attend Oracle OpenWorld 2018. You heard that right! Oracle OpenWorld will take place in San Francisco on Tuesday, October 23rd, and will run through Thursday, October 25th.

Considering that transforming the face …

Applications Manager 2 min read

Why password blacklisting is so important, and how to do it in Active Directory

Enable security measures against weak, common passwords

Passwords are still the most popular authentication method used to grant users access to critical business resources. According to the 2017 State of Authentication Report, more than half of US companies use only passwords to protect their intellectual property …

ADSelfService Plus 2 min read

Microsoft Patch Tuesday updates for October 2018

It’s the second Tuesday of the month, which means it’s time for another round of Patch Tuesday updates from Microsoft. This month’s Patch Tuesday was highly anticipated for two reasons: 1) it was expected to provide a critical fix for …

Desktop Central 2 min read

Is Google Sync a vector for data breaches?

Many users enable Google Sync so they can use one Google account for both personal and business purposes. Google Sync synchronizes bookmarks, browsing history, passwords, and extensions across Chrome browsers that are logged in under the same account, allowing users …

General 2 min read

Auditing and securing Active Directory webinar series

With the number of data breaches increasing by the day, enterprises need to closely evaluate their security infrastructure. Protecting systems and critical data, averting potential threats related to privileged access, and comprehensive event monitoring are essential areas that need to …

Active Directory 1 min read