Latest Posts

Five worthy reads: Supply chain cyberwarfare

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we are exploring the concept of supply chain cybersecurity in a time when there is a rising number of

General 3 min read Read

IT security under attack: Credential dumping attacks in Windows environments

Most of the time, threat actors in the cybersecurity landscape don’t employ advanced techniques and tools to intrude and establish a foothold within networks.  Often, they disguise malicious operations by mimicking the activities of legitimate users, leaving behind little to …

Log360 3 min read Read

January 2021 Patch Tuesday fixes 83 vulnerabilities

As IT administrators do their best to cope with business continuity plans, it’s imperative that they understand and manage patch updates. With cybersecurity threats on the rise thanks to the pandemic, it is essential to gain a better understanding of …

Patch Manager Plus 3 min read Read

[Infographic] Global remote work stats in 2020 for IT admins

In 2020, the pandemic forced huge corporations to accelerate executing plans most of them had for many years — having a hybrid workforce.

But moving all or some of the workforce to working from home comes with its own set …

General 3 min read Read

Five worthy reads: Make data security your New Year’s resolution

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. More than ever, now is the time for organizations to prioritize data security. This week we look at some data security

General 3 min read Read

Manage IT on the go with our incredibly effective mobile apps

Mobile apps for IT Operations ManagementEven an insignificant network issue can wreck havoc on your IT infrastructure when left unmanaged. This makes it vital that your IT team is alerted instantly whenever an issue arises, so they can troubleshoot it quickly, and ensure network stability.…

Network 4 min read Read

Protect your organization against Adrozek

Adrozek is a malicious browser modifier that, when installed on users’ machines, infects them with adware. This particular strain of malware has been making rounds since May 2020; according to Microsoft, it was at its peak in August, when as …

Desktop & Mobile 2 min read Read

German research organization bids adieu to multiple management platforms using OpManager

GFK is Germany’s largest market research institute and the fourth biggest market research organization in the world. It has a global digital presence in over 60 countries, with around 120 offices, and has been providing consumer and market insights for …

OpManager 2 min read Read

Wake on LAN with IP address manager: A holistic approach to remote booting

Wake On LAN Tools - ManageEngine OpUtils

Wake on LAN(WOL)  has been a go-to solution for most network admins to ensure an uninterrupted IT resource. Aiding in remote booting of wired and wireless networks, WoL helps optimize energy usage even as it ensures your network resources …

OpUtils 4 min read Read