Top tips: Camfecting—Protect yourself from prying eyes

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week,...

Active Directory , Corporate Blog , Desktop & Mobile , IT Security , IT Security - Cloud , ManageEngine , Network 3 min read Read

Has your personal data been breached on the dark web?

The dark web can feel like a mysterious underworld, a hidden corner of the internet where there are no rules. It’s a place where stolen...

Log360 2 min read Read

How to secure PHI with an identity governance solution

Cyberattacks pose a growing threat across all industries, but healthcare is especially vulnerable. In 2023, hacking incidents in the healthcare sector accounted for 79.7% of...

ADManager Plus 2 min read Read

Combating phishing attacks with passwordless FIDO2 authentication

Attackers predominantly use phishing attacks to steal and misuse user identities. A global Statista study on employee-reported malicious emails revealed that in the first quarter of...

ADSelfService Plus 2 min read Read

Identity Management Day: Protecting your digital footprint

Identity Management Day occurs on the second Tuesday of April, April 9 this year. It was established by the Identity Defined Security Alliance in 2021...

AD360 2 min read Read

Uncovering identity threats: Lessons learned from a real-life data breach

Every IT admin, regardless of the company size or employee count, shares a common fear: data breaches. The horror of discovering their organization’s data exposed...

ADManager Plus 2 min read Read

USB review, Part 2: How to manage USB devices

In this two-part series, the first blog demonstrates how USB devices can be conduits of threats. Read that blog to learn more about USB security threats. In this...

DataSecurity Plus 4 min read Read

Backup basics: Ensuring data security in an uncertain world

In today’s digital age, where data is the lifeblood of businesses and individuals alike, the importance of backup and data protection cannot be overstated. Whether...

RecoveryManager Plus 2 min read Read

Tech tales and endpoint hacks: Dive deep with Endpoint Pulse

Remember the captivating stories you heard growing up? Though we may have graduated to books and then podcasts, the power of storytelling remains. There’s something...

Customer Story , Desktop & Mobile , Endpoint Central , General , IT Security , ManageEngine , ManageEngine UEM 2 min read Read