Must-have features to recover quickly from accidental deletions in Active Directory

Any IT admin that takes care of the IT infrastructure of a network will know how devastating accidental deletion of objects in Active Directory (AD) can be. No matter...

General 2 min read Read

Five worthy reads: Embracing the era of everything-as-a-service (XaaS)

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we delve into the increasing...

General 2 min read Read

Mitigating insider threats with user behavior analytics [Free webinar]

  Keeping threats at bay and safeguarding the network is every IT administrator’s primary concern. However, it’s usually easier said than done. With traditional auditing...

General 1 min read Read

#MEtheNorth: Here’s how our User Conference can help you stay on top of your IT game

The Raptors winning the NBA title may not be the only big thing to hit Canada in 2019. In two weeks, we’ll kick off our...

General 3 min read Read

There’s more than one way to get admin privileges

Active Directory (AD) was introduced to the IT world in the mid-1990s, and it has come a long way since then, undergoing several stages of...

General 2 min read Read

Microsoft Patch Tuesday August 2019: WannaCry-level “wormable” flaws patched

No matter how prepared you are, Patch Tuesday never fails to throw in a surprise. With the Microsoft Security Response Center’s warning note, “August 2019 Security Update includes...

General 3 min read Read

Five worthy reads: Is your enterprise dealing with data sprawl properly?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we define what data...

General 3 min read Read

Top three reasons passwords are here to stay as the primary form of authentication

Yahoo and cell phone companies like Samsung wanted to kill passwords in 2005 and 2014 respectively, yet in 2019 most of us are still logging on...

General 2 min read Read

The why and how of browser security

The internet has reshaped the workplace, and internet browsers have become an indispensible tool for today’s workforce. Browsers have also become the weak link that...

General 3 min read Read