2018 is coming to an end and you might already be looking back at how this year has been for you. In the IT world, 2018 started with the...
The relationship between steganography and cyberattacks
There’s no denying the importance of communication. Businesses cannot function without the proper means of communication, such as phone calls, faxes, emails, text messages, and more. However, not all forms of communication are secure, meaning the...
10 firewall best practices for network security admins [Free e-book]
The field of network security is rapidly changing. In 2018, a single data breach incident cost U.S. firms on average $7.91 million, while breaches in Canada and Germany were around an average of $5...
ADSolutions’ year in review, Part 5: EventLog Analyzer
Our product development team has been focusing on correlation and threat intelligence features, with the goal of thwarting external breach attempts. This year, we built new capabilities,...
ADSolutions’ year in review, Part 4: ADAudit Plus
Following the Cambridge Analytica scandal, IT security has catapulted to the headlines in 2018. With every organization striving to secure their IT infrastructure better than ever...
ADSolutions’ year in review, Part 3: ADSelfSevice Plus
Just like our other ADSolutions products, ADSelfService Plus—our secure, end-user password reset management and single sign-on solution—had a feature-packed 2018. With ADSelfService Plus, you don’t have to compromise...
ADSolutions’ year in review, Part 2: O365 Manager Plus
Office 365’s native tool has its share of limitations that pose various challenges to organizations adopting Office 365. For instance, the Security and Compliance Center retains...
5 ways to ensure business continuity in the wake of network disasters
Many businesses today are built around their network infrastructure, which often requires frequent modifications. But these frequent changes can turn out to be the weakest link in their infrastructure. Any of these changes have the potential to cause network...
[Free Webinar] Send weak passwords packing with a password policy enforcer
With the number of applications employees use increasing rapidly, it can be relatively easy for end users to fall into the habit of using passwords like Password@123. Even...