Product Security Hardening is an option that has been added to ADManager Plus in version 7116. With this option, you can configure security-specific settings of...
![](https://blogs.manageengine.com/wp-content/uploads/2021/10/NOBELIUM-s-phishing-attack-Ad-1-Op-2-800x284.jpg)
[Free e-book] How to protect Microsoft 365 from the NOBELIUM hackers’ phishing attack
NOBELIUM is the group behind the SUNBURST backdoor, TEARDROP malware, GoldMax malware, and other related components. Known for its undetectable attack techniques, NOBELIUM’s recent malicious...
![](https://blogs.manageengine.com/wp-content/uploads/2021/09/O365-Security-Settings-SM-1-800x284.jpg)
[Free e-book] The Office of Inspector General’s (OIG’s) Microsoft 365 audit checklist
What is the OIG? OIG stands for Office of Inspector General, which is part of the U.S. Department of Health and Human Services (HHS). The...
![](https://blogs.manageengine.com/wp-content/uploads/2021/09/Blog-800x284.jpg)
How brute-force attacks are spearheading ransomware campaigns
Ransomware groups have been exploiting the switch to remote work unlike any other. Ransomware attacks increased by more than 485% in 20201. By 2031, a...
How Kaseya fell victim to a ransomware attack
On July 2, 2021, the cybersecurity world woke up to yet another ransomware attack—this time, the victim was Kaseya, a software enterprise that provides IT...
![](https://blogs.manageengine.com/wp-content/uploads/2021/09/Untitled-design-2.png)
3 reasons SMBs are more vulnerable to cyberattacks than large enterprises
Details about cyberattacks on small-and-medium-sized businesses (SMBs) may not make it to the headlines, but numerous industry reports and surveys have highlighted the grim reality...
![](https://blogs.manageengine.com/wp-content/uploads/2021/06/Blog-banner-1-800x284.jpg)
Why companies need URL filtering for enhanced cloud protection
The cloud landscape is rife with unsafe URLs and inappropriate content. This—coupled with the accelerated adoption of cloud applications in the workplace—has created an urgent...
The role of endpoints in the security of your network
Endpoint security is a hot topic of discussion, especially now with so many businesses shifting to remote work. First, let’s define what endpoints are. Endpoints are...