A critical vulnerability in sudo has been disclosed, that when exploited, enables users to bypass security restrictions and execute commands as the root user. This security flaw has to be swiftly remediated as sudo is one of the most integral …

Everything you need to know about macOS 10.15 Catalina
The latest version, macOS 10.15, has been named Catalina. This comes as a free software update and is available on the App Store. It comes with exciting features for Apple users—Catalyst, Gatekeeper, Screen Time, and a Sidecar extension …
Microsoft Patch Tuesday October 2019: 59 vulnerabilities fixed
The second Tuesday of the month is here, and if you manage tons of endpoints, this can only mean one thing to you: Patch Tuesday updates. This Patch Tuesday brings us updates to fix 59 vulnerabilities, eight of which are …

Upgrading an OS before the end of 2019: Convenience or compromise?
Desktop management is a continuous and never-ending process, especially for monitoring potential security issues. IT administrators need to constantly safeguard network devices and update endpoints to prevent vulnerabilities. The need for efficient desktop management to thwart attacks against OSs has …
Effortlessly updating BIOS and patching drivers using Desktop Central
Did you know that one of the most common reasons for hardware failure is neglecting to update drivers and BIOS? If you don’t update your drivers, not only are you risking hardware failure, but you’re also missing out on …
Microsoft Patch Tuesday September 2019: 79 vulnerabilities fixed
No matter how prepared you are, Patch Tuesday never fails to throw in a surprise.
All supported versions of Windows are affected by two privilege escalation vulnerabilities that have already been exploited in the wild, CVE-2019-1214 and CVE-2019-1215. Since …
The role of antivirus software in enterprise IT security
IT admins frequently grapple with serious issues faced by their enterprise. They often have to make crucial business decisions, such as choosing the right antivirus software to defend their systems. However, with evolved computers and advanced software and hardware available …