Microsoft Patch Tuesday updates for October 2018

It’s the second Tuesday of the month, which means it’s time for another round of Patch Tuesday updates from Microsoft. This month’s Patch Tuesday was highly...

Endpoint Central 2 min read Read

Top five enhancements of the Windows 10 October 2018 update

If you’re a tech enthusiast or just a Microsoft fan, you’re probably aware that Microsoft releases two major software updates a year for Windows. Windows 10 version 1809 was just...

Endpoint Central 2 min read Read

Cover all your enterprise troubleshooting needs with Remote Access Plus

Are you juggling multiple tools to rescue users from IT incidents? With the number of endpoints in many organizations growing every day, system administrators and help desk technicians are...

Remote Access Plus 2 min read Read

Tired of switching between multiple solutions to manage different device types?

Every enterprise dreams of managing and securing all of its endpoints, but that can get complicated with multiple device types, each running different operating systems....

Endpoint Central 3 min read Read

Upgrading to macOS Mojave? Here’s what to expect

Apple has finally released macOS 10.14, named Mojave after one of California’s three deserts. But why a desert? you may wonder. Some think the new name signifies the beauty of a desert...

Endpoint Central 2 min read Read

Patch Tuesday updates for September 2018

The September edition of Patch Tuesday includes fixes from Microsoft for 61 security issues. Of these issues, three include zero-day vulnerabilities and 17 are marked as critical.  Patch Tuesday updates for Microsoft products  This month’s...

Endpoint Central 2 min read Read

What is mobile device management, and why will it enhance enterprise IT security? 

Technological advancements aren’t hard to find. Just look at how huge CRT monitor computers have turned into slim, weightless laptops—or how brick-sized cellular phones have become...

Mobile Device Manager Plus 5 min read Read

Tinder hack targeting RAF’s F-35 program emphasizes the need for mobile device management

While security professionals are busy protecting enterprises against DDoS attacks, ransomware, and application vulnerabilities, another type of cyberthreat has proven arduous to overcome: social engineering attacks. One of the latest cases of...

Mobile Device Manager Plus 3 min read Read

Prevent Man-in-the-Disk attacks using the right mobile security procedures

Organizations that offer employees the freedom of mobility gain some advantages, which can include better productivity or saving workplace costs by allowing employees to work from home, but doing so comes...

Mobile Device Manager Plus 2 min read Read