dcsimg

6 Ways IT Teams Can Help Reduce Rework and Unproductive Labor

Two of the biggest drains on a company’s IT resources are rework and unproductive labor. While you might be tempted to lump them both together under “unproductive labor,” “rework” really needs to be separate. Unproductive labor may not be related to competence. Rework means your technician did something wrong and then they (or someone else) had to go do the work again. This is very often … [Read more...]

Parallels Remote Application Server Blog – Application virtualization, mobility and VDI 2019-03-22 15:31:56

EMEA Parallels Partner Conference 2019 – Award Ceremony This year’s Parallels Partner Conference won’t be forgotten. Over 140 attendees from all areas of our partner ecosystem joined us to help make the event a success. The evening provided good food and fun, with a gala and awards ceremony recognizing our successful partners from Europe, the Middle East, and Africa (EMEA) region. The Parallels … [Read more...]

Facebook Password Breach: What You Need to Know

Yesterday Facebook disclosed during a routine security review they discovered “some” user passwords were being stored unencrypted, but the passwords were not visible to anyone outside of Facebook. Facebook’s definition of “some” doesn’t really illustrate the full magnitude of this event. We are talking hundreds of millions of users that are affected. False … [Read more...]

Tenable Expands Leadership Team with Key Appointments to Global Engineering and Business Development

Tenable®, Inc., the Cyber Exposure company, today announced two key additions to its executive team who will help lead the company through the next phase of its Cyber Exposure mission to help customers manage and measure cyber risk in the digital era. Glen Pendley, who most recently served as the company’s Deputy Chief Technology Officer, has been promoted to Tenable’s first Senior Vice President … [Read more...]

Easy WP SMTP WordPress Plugin Exploited In The Wild

Popular WordPress plugin vulnerable to unauthenticated attacks continues to be targeted despite the availability of a patch. Background On March 17, researchers at Ninja Technologies Network (NinTechNet) published a blog about their discovery of a critical zero-day vulnerability in the Easy WP SMTP plugin that attackers began exploiting in the wild on March 15. According to WordPress, the Easy WP … [Read more...]

How to Set up Azure Network Adapter in 4 Steps in Windows Server 2019

This guide will shows you how to configure a hybrid cloud connection using the new Azure Network Adapter through Windows Admin Center on Windows Server 2019 Read the post here: How to Set up Azure Network Adapter in 4 Steps in Windows Server 2019 … [Read more...]

Are hackers gonna hack anymore? Not if we keep reusing passwords

Enterprises have a password problem, and it’s one that is making the work of hackers a lot easier. From credential stuffing to brute force and password spraying attacks, modern hackers don’t have to do much hacking in order to compromise internal corporate networks. Instead, they log in using weak, stolen, or otherwise compromised credentials. Take the recent case of Citrix as an example. The FBI … [Read more...]

The Email Security Education Series: What Does a Phishing Campaign Look Like?

Please note: For privacy reasons the identity of the hacked account in the example used for this blog has been changed. Read More … [Read more...]

Gartner Peer Insights Customers’ Choice for Privileged Access Management: The 10 Most Impressive Customer Stories To Us

We are honored to announce that we have been recognized as a March 2019 Gartner Peer Insights Customers’ Choice for Privileged Access Management. In its announcement, Gartner explains, “The Gartner Peer Insights Customers’ Choice is a recognition of vendors in this market by verified end-user professionals, taking into account both the number of reviews and the overall user ratings.” In order to … [Read more...]

Thycotic Recognized as a March 2019 Gartner Peer Insights Customers’ Choice for Privileged Access Management

Washington D.C, March 21, 2019 – Thycotic, a leading provider of Privileged Access Management solutions, is excited to share that they were named a March 2019 Gartner Peer Insights Customers’ Choice for Privileged Access Management. Gartner defines Privileged Access Management (PAM) as “tools which help organizations provide secure privileged access to critical assets and meet compliance … [Read more...]