How to Run Commands on Remote Computers with PowerShell

Running commands locally on the remote computers is a common task many IT admins have to do every day. Here's how you can do that in PowerShell. … [Read more...]

How to Make an Availability Set in Azure

Availability Sets run across multiple locations so in a failure, only a subset of your VMs are impacted. An essential feature of any reliable cloud solution Read the post here: How to Make an Availability Set in Azure … [Read more...]

Securing Your Remote Access—Are You Managing Logins Effectively?

As managed service providers (MSPs), you work diligently to protect both yourselves and your customers against compromise by adopting a layered security strategy. But are you taking the level of care you should with your remote access solution?  Guarding the gateway to your customers' resources Read More … [Read more...]

Thycotic Debuts Free Cyber Security Toolkit for College Students and Families

Proactive Communication About Cyber Strategies Helps Schools Reinforce Commitment to Keeping Information Safe WASHINGTON, D.C., Oct. 23, 2018 — Thycotic, a provider of privileged access management (PAM) solutions for more than 10,000 organizations worldwide, today released a free Cyber Security Toolkit for College Students and Families – an essential guide to help schools build an … [Read more...]

Compromising vital infrastructure: how voting machines and elections are vulnerable

In our first post in a series about vital infrastructure, we aim to explore how secure our voting machines—and our votes in general—are ahead of the upcoming midterm elections. Here, we ask ourselves: How can our infrastructure be compromised? What are the consequences, and how can we prevent attacks or limit the damage? The outcome of elections has an enormous impact on the political and cultural … [Read more...]

Meet our team of experts at this year’s GDPR Summit

The GDPR Summit is taking place at Croke Park on November 6.    IT Governance Europe will be exhibiting as an industry leader to present our wide range of GDPR solutions, which can be tailored to combat the most complex information security, data protection, risk and compliance problems. One of the keynote talks on the day is being delivered by our very own Sharon O’Reilly alongside Peter … [Read more...]

How to report a data breach to your supervisory authority

Under the GDPR (General Data Protection Regulation), organisations must report certain types of data breach to their supervisory authority within 72 hours of becoming aware of it. This requirement can be relatively straightforward if you are suitably prepared. The first thing you’ll need to determine after a breach is whether the incident meets the GDPR’s criteria for reporting – i.e. does it pose … [Read more...]

Parallels RAS team at IDC’s Multi Cloud Conference The Netherlands

We’re excited to announce that the Parallels team will present Parallels Remote Application Server (RAS) at the IDC’s Multi Cloud Conference The Netherlands at Tobacco Theater in Amsterdam on Tuesday, November 6, 2018. One of the event’s key speakers will be Maurice van den Berg, who is the Sales Director for Parallels RAS Benelux and North region. In addition, the Parallels team will meet … [Read more...]

A week in security (October 15 – 21)

Last week on Malwarebytes Labs, we went over how to build your own motion-activated security camera, wondered whether FIDO is the future instrument to replace passwords and usernames, informed you about information operations on Twitter, and released our Q3 Malwarebytes Labs Cybercrime Tactics and Techniques Report (CTNT). Other cybersecurity news: Pentagon data breach puts personal details of … [Read more...]

Mail Assure Enhances Trust with Data Storage Regionality

Trust is the bedrock of any successful relationship. If you can’t trust your email security, it could end up straining your relationships with users. How can you embrace the benefits of cloud-based email filtering without compromising security or adding risk?  Read More … [Read more...]