Latest Posts

Simplifying security auditing, Part 1: Regularly reviewing server activity 

Everyone knows about the importance of log management in IT security. Yet, organizations struggle with implementing effective log management techniques in their networks. This blog series aims to revisit the fundamentals of log management and discuss the different security events …

IT Security 2 min read

 “Ok Google, what does Android Pie have in store for enterprises?”

From Android Enterprise to zero-touch enrollment, Google has recently been taking giant strides towards the enterprise management space. Earlier this year, many of us were wondering which dessert Google would name their newest Android release after. That name turned …

Mobile Device Manager Plus 2 min read

Patch Tuesday updates for August 2018

Last month’s edition of Patch Tuesday left many of us stranded since the patches it contained caused more trouble than the vulnerabilities they were intended to fix.  Situations like this often leave sysadmins with only two options: install the updates …

Desktop Central 2 min read

Protect your data from the Bluetooth bug that has affected billions of devices

With organizations still recovering from the damages caused by recent desktop malware attacks, like SamSam and PowerGhost, a newly discovered bluetooth vulnerability, CVE 2018-5383, is now threatening the data on billions of personal and corporate mobile devices and laptops by …

Mobile Device Manager Plus 2 min read

Less is more: Role-based performance monitoring with OpManager 

Much of a business’ strength lies in its network infrastructure. One way to keep your business up and running is by proactively monitoring key network performance indicators. However, with a plethora of parameters to keep an eye on, and a …

OpManager 2 min read

Microsoft Edge vulnerability paves the way for another data breach

Let’s face it—application vulnerabilities have become inevitable in recent years. When Microsoft released Edge, its web browser created to replace Internet Explorer, it came with new features and enhancements, but it also brought along an unexpected vulnerability that allows hackers …

Patch Manager Plus 2 min read

Provisioning users in an Office 365 environment

Separately provisioning users in Active Directory (AD) and Office 365 is repetitive and inefficient. Other than complex PowerShell scripting, Microsoft doesn’t provide options for provisioning users for AD and Office 365 in bulk. User provisioning requires a systematic and streamlined …

Active Directory 1 min read

Lessons from one of the first major data breaches in a post-GDPR Europe

As the buzz around the GDPR and its implementation begins to settle down, we’re starting to see how this regulation is changing the way business respond to breaches. One of the first victims of a major data breach since the …

General 2 min read

SingHealth cyberattack highlights importance of endpoint hardening

One of the most important aspects of healthcare reform is an emphasis on preventative care, which makes the recent cyberattack on Singapore’s largest group of healthcare institutions, SingHealth, somewhat ironic. Unfortunately, SingHealth couldn’t prevent an attacker from stealing the personal …

Patch Manager Plus 2 min read

Learn how to make the most out of your cloud and on-premises apps

In the digital economy, business applications have played an integral part in the evolution of enterprises. Application complexity is on the rise now that IT infrastructures are becoming more diverse, and managing dynamic applications is more challenging than ever before. …

Applications Manager 1 min read