In terms of collaboration, Structured Threat Information eXpression (STIX) and Trusted Automated eXchange of Indicator Information (TAXII) represent a revolution in the security industry. These protocols transformed...
Search results for: 7 problem management
Training: Join us to learn best practices on applications performance monitoring
In an era fueled by innovation, it’s crucial for your organization to embrace the idea that customer satisfaction is the catalyst for commercial success....
Integrate Desktop Central with Zendesk to boost your productivity
With a unified endpoint management (UEM) solution, you can keep your IT assets and network resources secure while still providing the freedom your users need to creatively solve business problems. Imagine...
Meltdown and Spectre: Battling the bugs in Intel, AMD, and ARM processors
In preparing for GDPR compliance, you may have heard of Meltdown and Spectre—two new hardware bugs that exist in Intel, AMD, and ARM processors and are capable of...
Prevent remote code execution by disabling Microsoft’s Equation Editor now
While many of us are looking forward to some well-earned time off, cyber attacks aren’t taking any breaks this holiday season. In late November, Cobalt Cybercriminal Group took advantage of a 17-year-old vulnerability in Microsoft Office’s Equation Editor, the CVE-2017-11882 exploit. The Cobalt Cybercriminal...
System Tools: Our free Android app for remote system administration
Managing systems in any network can be overwhelming, as users come up with new requests and issues every day. To ease the burden of these mundane, routine tasks, most IT administrators already know that they can employ...
Introducing our rapid-start enterprise service desk
A cloud-based enterprise service management solution from ServiceDesk Plus At ServiceDesk Plus, we’re constantly thinking of ways we can make it easier for your users to ask for and receive help. Since 2003, ServiceDesk...
Self-signed certificates: Wolves in sheeps’ clothing
Things often turn out great when you do them yourself. But when it comes to signing SSL certificates, you might want to give that DIY project a second thought. Before...
Stressed about Delta Charlie malware? Desktop Central has you covered
Vulnerability threats are any IT administrator’s worst nightmare. Recently, following the release of WannaCry ransomware, IT administrators have been feeling the heat when it comes to security threats. This new...