dcsimg

6 security concerns to consider when automating your business

Automation is an increasingly-enticing option for businesses, especially when those in operations are in a  perpetual cycle of “too much to do and not enough time to do it.” When considering an automation strategy, business representatives must be aware of any security risks involved. Here are six concerns network admins and other IT staff should keep in mind. 1. Using automation for … [Read more...]

How to Engage Customers in Your Customer Relationship Process

Building strong relationships with your customers is critical to the growth of your business. As a managed service provider (MSP), a large part of this comes from sitting down with your customer—not just as a way to prove the value of your service, but also as a way to really get to know their business needs.  Read More … [Read more...]

Thycotic Ranked Number 436 Fastest Growing Company in North America on Deloitte’s 2018 Technology Fast 500™

Attributes 174 Percent Revenue Growth to Tremendous Cloud and Customer Momentum Washington D.C., November 16, 2018 — Thycotic, provider of privileged account management (PAM) solutions for more than 10,000 organizations worldwide, today announced it ranked No. 436 on Deloitte’s Technology Fast 500, a ranking of the 500 fastest growing technology, media, telecommunications, life sciences and energy … [Read more...]

Malwarebytes Endpoint Security Protects Where Other Solutions Fail!

  Malwarebytes Endpoint Security brings all of industry-leading protection and remediation technologies into one powerful solution. This multi-layer defense model breaks the attack chain by combining advanced malware detection and remediation, malicious website blocking, ransomware blocking, and exploit protection into a single solution. Read more and request your free trial here. … [Read more...]

Why Privacy Regulations Don’t Always Do What They’re Meant To

First, California passed major privacy legislation in June. Then in late September, the Trump administration published official principles for a single national privacy standard. Not to be left out, House Democrats previewed their own Internet “Bill of Rights” earlier this month. Read more here Source hbr.org … [Read more...]

Are you aware of the risks associated with the Cloud?

According to the 2018 Bitglass Cloud Adoption Report, more than 81% of organisations have now adopted the Cloud in some form. However, moving data to the Cloud does not solve security problems – rather, it adds another element that needs addressing.  Find out how to tackle this issue with our book of the month for November, Data Protection and the Cloud – Are you really managing the risks? Data … [Read more...]

IT Security Trends Of 2018

As many had predicted, 2018 has been rough ride for many organisations trying to keep their reputation intact and fend off lawsuits and fines. The year is far from over, and we’ve already seen over 53,000 incidents and 2,216 confirmed data breaches. In April, Saks, Lord & Taylor suffered a breach exposing credit card details of five million users. In May, 150 million records were … [Read more...]

Popular WordPress ‘AMP for WP’ Plugin Vulnerable to Privilege Escalation Attacks

The ‘AMP for WP – Accelerated Mobile Pages’ plugin for WordPress is vulnerable to a privilege escalation attack. Updating the plugin to version ‘0.9.97.20’ fixes the flaw. Background Following the discovery of a critical vulnerability in the WP GDPR Compliance Plugin, another critical WordPress plugin vulnerability was discovered this week in the popular AMP for WP plugin by researchers at WebARX … [Read more...]

Compromising vital infrastructure: air traffic control

While most of us know that flying is the safest mode of transport, we still feel that sigh of relief when the plane has made its landing on the runway and we can text our loved ones that we have arrived safe and sound. Accidents may be rare, but they’re often shocking and horrific and accompanied by the loss of many lives. Unfortunately, they also tend to make the news, which only heightens … [Read more...]

Create Windows Machine Builds with Packer

While it supports Windows and Linux, creating an OS image is vastly different between the two. In this article, I will focus on how Packer is used for Windows OS image creation. … [Read more...]