Latest Posts

Create custom views and tag your alerts to keep an eye on high-priority incidents

Overwhelmed with too many applications and too many alerts? Don’t worry. With AlarmsOne’s Views and Tagsyou can easily filter and categorize your alerts.  

 Custom views:

AlarmsOne allows you to create multiple views so that your alerts don’t clutter

AlarmsOne 2 min read

Stressed about Delta Charlie malware? Desktop Central has you covered

Vulnerability threats are any IT administrator’s worst nightmareRecently, following the release of WannaCry ransomware, IT administrators have been feeling the heat when it comes to security threats. This new batch of malware

Desktop Central 2 min read

[Free Webinar] Awesome Active Directory password controls

Active Directory passwords are easy to crack. Since the password controls have not changed in over 15 years, attackers have been given ample opportunity to develop successful strategies for cracking passwords. We all have the same vulnerability with regard to …

Active Directory 1 min read

WannaCry: Battle with the shadow

There are two kinds of people in America today: those who have experienced a foreign cyber attack and know it, and those who have experienced a foreign cyber attack and don’t know it.”
-Frank Wolf, former member

Desktop Central 3 min read

Log management and SIEM fundamentals: Mitigating security threats 

In parts 1 and 2 of this blog series, we went over SIEM and its role in performing a thorough audit of your network. Now that we’ve got the basics out of the way, it’s time to get into

IT Security 3 min read

Protecting against Petya and other ransomware

As a security professional, which do you fear more: 1) explaining to your boss or CEO that your enterprise’s files are no longer accessible because they’ve been encrypted or 2) bungee jumping? I bet you and

IT Security 2 min read

WannaCry again? Meet Adylkuzz, its sneaky cryptocurrency mining sibling

More than 400,000 computers wrldwide have been infected with WannaCry ransomware since the beginning of the devastating attack on May 12th, 2017. WannaCry has compromised standalone and networked Windows computers, at home and in the enterprise.

Desktop Central 3 min read

Get notified when a folder is shared on servers and workstations

We all know that sharing a folder on a server opens up an entry point to that server. Even if the share for the folder is hidden (by adding a $ to the share name), nearly anyone on the network …

Active Directory 2 min read

Log management and SIEM fundamentals: Comprehensive log collection and auditing

The first step in SIEM is collecting log data. Log data, as we saw in part 1, is what drives any SIEM solution. A SIEM solution should be able to process, in real time, large

IT Security 3 min read

If you think WannaCry is huge, wait for EternalRocks!

While the world was responding to the WannaCry attackwhich only utilized the EternalBlue exploit and the DoublePulsar backdoorresearchers discovered another piece of malware, EternalRocks, which actually exploits seven different Windows vulnerabilities  

Miroslav Stamper,

Desktop Central 2 min read