There are many moving parts with regard to Group Policy, which can make it difficult to know which areas of Group Policy you should focus...
Six things to consider before choosing a log management solution
Budgeting for IT has always been a problematic topic of discussion when planning an organization’s total budget. Organizations typically want to buy cutting-edge security solutions at the lowest cost possible. But we all know there...
Building a better help desk: Part 4, the key to an efficient help desk
For the past couple years, it had become routine for Nick to return home from work well past midnight. Like so many other help desk technicians,...
Building a better help desk: Part 1, trouble-free user onboarding
You sit down at your desk on Monday morning and the first thing you see is an email from HR asking you to onboard a dozen new hires. Isn’t that just a great...
Active Directory from A to Z!
Now that summer is over, we are delivering a variety of webinars all geared to increase the security, productivity, and overall stability of your Active...
Adopting a SIEM solution? Here’s what you need to know
Cyberattacks have become an everyday affair, especially with the WannaCry attack and EquiFax breach making headline news recently. You might be asking yourself why cyberattacks have become more...