In administrating all technology and application requirements within an organization, IT operations management (ITOM) is pretty complex, and tends to send IT admins scrambling for...
The LLMNR/NBT-NS strike
Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are two protocols that are used to identify a host address on a network when...
Five worthy reads: Embracing Zero Trust during a pandemic
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. With the rising concern over cybersecurity...
How to track down network faults, combat threats, and accelerate network performance to bolster your remote workforce [Webinar]
With remote work quickly becoming the new norm, the business landscape is facing an entirely new set of challenges. Organizations are scrambling to steer clear...
Launching Desktop Central Cloud: Embrace UEM the SaaS way!
Desktop Central is a holistic unified endpoint management (UEM) solution that offers a dynamic approach to securing and managing user devices, including desktops, laptops, smartphones,...
Leveraging IoT to target pain points in the healthcare industry
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. Most healthcare facilities already use the...
SQL Server, Part 4: Understanding built-in SQL Server principals
In the previous blog in this series, we discussed the principle of least privilege, and the importance of assigning bare minimum privileges to users and systems at database...
Five worthy reads: Privacy in pandemic management
Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we explore the...
Your return-to-the-office cybersecurity checklist
The novel COVID-19 pandemic has changed the way organizations work. The sudden transition to remote work has forced organizations to look for temporary fixes to bridge...