Latest Posts

#Uncomplicate your IT with integrated ITOM software

Technology is supposed to make our lives easier, but it often unintentionally makes life even more complicated. IT management tools can reign in this complication, but there are often too many tools to choose from, each with their

General 2 min read

Start streamlining GPO management with ADManager Plus

Wise are the administrators who create Active Directory (AD) objects and apply GPOs to them all at once. Even wiser are the administrators who achieve this without using the Group Policy Management Console (GPMC).

As an administrator, you have to …

ADManager 2 min read

Ransomware basics: Part 3

Even as I write this, I get the feeling that this blog series is too basic, but with the sheer number of attacks and recent news on this topic, it’s obvious ransomware basics are not common knowledge. We focused on …

Active Directory 1 min read

Begin your GDPR journey with privileged access management

The core of the GDPR is all about data protection; specifically, securing EU citizens’ personal data. However, the GDPR does not explicitly state how to achieve this level of security. It doesn’t recommend any specific technologies to help organizations maintain …

Password Manager Pro 3 min read

Support your end users, not your software

ITSM is in a period of rapid change, that much is for sure. But with so much changing, it’s important to stay focused on what really matters: helping your end users. At our upcoming NYC User Conference, we’ll

General 3 min read

Ransomware basics: Part 2

In our first installment, we discussed the importance of backing up your data. Without a good backup, chances are you might never see your data again after a data loss event. The next step in your preparation to defend against …

Active Directory 2 min read

5 shortcomings of native Active Directory backup and recovery tools

Microsoft’s Active Directory (AD) is a key network service in many organizations; without it, those organizations‘ entire networks would come to a grinding halt. For that very reason, AD administrators need to be prepared for the various disasters

RecoveryManager Plus 2 min read

Getting to know the GDPR: The technical and organizational measures

Before we jump into the third part of this GDPR blog serieslet’s take a moment to think about a few questions. Such aswhy are compliance mandates necessary? Are they framed to just prevent data breaches?

EventLogAnalyzer 2 min read

Using Foxit Reader? You might be vulnerable to network breaches 

Cybersecurity and cyberattacks have become prominent topics lately. No matter how much you secure your network, vulnerabilities continue to emerge for different operating systems and applications. Most recently, security professionals have discovered two critical vulnerabilities in a third-party PDF

Desktop Central 2 min read

Ransomware basics: Part 1

There are many articles on ransomware. Many are trying to convince you that if you buy the products they mention, you can prevent ransomware attacks. I want to shed light on the reality of the situation, which is that ransomware …

Active Directory 2 min read