Establishing a startup isn’t easy; founders often spend a good majority of their time mapping out finances, operations, raw materials, product development, solid marketing and sales procedures, as well as hiring...
Introducing Custom Fields in Desktop Central
We’re constantly amazed by all the creative ways our users adapt the features of Desktop Central. However, we know that one-size-fits-all software just can’t address...
Microsoft Patch Tuesday updates for January 2019
Patch Tuesday updates have generally been equated with just Microsoft updates for a long time. However, there is another major player that addresses vulnerabilities in its...
A year of Meltdown and Spectre: Questions that still remain
It was the summer of 2017 when two of the most devastating ransomware variants the world has seen—WannaCry and NotPetya—broke loose, infecting more than 300,000 machines and inflicting losses totaling more than $4 billion. By early 2018, many institutions...
The secret to efficiently managing all your clients’ mobile devices
A typical day for an IT admin working for a managed service provider (MSP) involves juggling different instances of an endpoint management solution. An MSP might rely on...
Preventing the SQLite Magellan vulnerability from damaging your applications
Emerging vulnerabilities and continuous patching have been at odds with each other ever since the information age began. Flaws are often simple enough that a patch can...
Microsoft Patch Tuesday updates for December 2018
Another month and another Patch Tuesday update from Microsoft. But this month, the buzz is all about a third-party patch from Adobe that addresses a...
SUSE Linux: Patching the world’s first enterprise distribution of Linux
For all you car fans out there, Tesla is all set to release its fastest full-electric production car, the Tesla Roadster, that can go from 0 to...
Secure your browser against these 5 threats
With organizations actively adopting cloud computing, browsers have become an indispensable part of every end user’s work life. Unfortunately, browsers have become a conduit not only for cloud computing, but also for cyberattacks. With this...