General

Visit:

Ghostscript vulnerability leaves enterprises waiting for a security patch

 

It often feels like there’s no end to software vulnerabilities and exploits. With every step towards technological advancements, another threat turns up. This is especially frustrating for enterprises, since it takes years to build your business’ reputation and just …

General 2 min read

Effective password management techniques for Active Directory [free webinar]

Join us this 30th August for an exclusive on-demand live webcast.

Passwords have formed an integral part of Microsoft Active Directory since its inception. From then on, most organizations have relied on Active Directory to manage their IT environment. Although passwords have formed the first layer of defense in most cases …

General 1 min read

Simplifying security auditing, Part 2: Auditing systems that store sensitive data 

In part 1, we looked at an overview of auditing servers. In this blog, we’ll discuss which events you need to audit in your databases and file servers where sensitive data is stored. New data protection regulations and large-scale …

General 2 min read

Lessons from one of the first major data breaches in a post-GDPR Europe

As the buzz around the GDPR and its implementation begins to settle down, we’re starting to see how this regulation is changing the way business respond to breaches. One of the first victims of a major data breach since the …

General 2 min read

Five worthy reads: The rising significance of privileged identity management

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we delve into how privileged identity management (PIM) solutions can help enterprises authenticate access and secure their corporate data.

General 3 min read

[Free guide] Common password attacks and effective countermeasures

Technology has changed over the years, but one constant remains—the username-password combination is still used to protect confidential information both online and offline. Unfortunately, usernames and passwords are often easy to guess. Weak passwords, coupled with strong social engineering techniques, …

General 2 min read

Keep your Office 365 access in sync

Business-critical applications like Office 365 directly impact an organization’s productivity. When users handle multiple applications on a day-to-day basis, they tend to either forget their passwords or mix them up, which leads to them getting locked out of vital applications …

General 1 min read

Synchronize employees’ G Suite and Active Directory passwords to avoid password reset tickets

 

As the number of G Suite accounts in your organization increases, managing all the password reset tickets from those accounts becomes a challenge. If your help desk is spending too much time on password resets, technicians may begin to …

General 2 min read

Three ways to protect your enterprise from network issues

Guard your enterprise network from configuration issues | ManageEngine Network Configuration Manager

“Knowing your history can give you the tools to shape your future.” – Gloria Feldt

When it comes to network management, having detailed data about various elements in your network plays a key role in making the right decisions. Deep …

General 3 min read

Red-card your storage issues!

Give storage issues the red card!

According to a study by Statista, the capacity of enterprise storage comes in at a colossal figure of about 1.45 zettabytes and is anticipated to hit 2.3 zettabytes by the end of the decade.

Many organizations are switching to dedicated …

General 2 min read