dcsimg

Install Free Let’s Encrypt SSL Certificate for Single-Domain IIS Web Sites

In this article, you’re going to learn how to get free SSL certificates from the Let’s Encrypt CA. We’ll also touch on how to make sure that the website is being served strictly using HTTPS and confirm that the right SSL certificate is in use. … [Read more...]

How to Move Up the Automation Maturity Model—Part 2: Where to Start

<p>In my last two blogs I looked at how I see our partners fitting into four categories when it comes to automation maturity. The categories include partners who aren’t interested in automating, partners who are interested but aren’t sure how to start, partners who have started the journey towards automation, and partners who automate anything they can. I also discussed how to show the value … [Read more...]

ISO 27001 vs SOC 2 certification: what’s the difference?

Are you looking to boost your data protection practices but can’t decide whether to follow the guidance of ISO 27001 or SOC (Service Organization Control) 2? If so, you’re in a familiar position. They’re two of the most popular information security and risk management frameworks in the world, and each one has its benefits. Let’s take a look at which one is right for you by reviewing five key … [Read more...]

How to Activate Parallels Desktop and Install Windows on Mac

Almost all users who purchase a subscription for Parallels Desktop do so with one goal in mind: to install Windows on Mac. Parallels Desktop Mac Business Edition will help you and your employees easily work with Windows programs on Mac, running even the most demanding applications effortlessly.  Before proceeding, you should have already signed up for Parallels My Account. In … [Read more...]

What are Open Shares and How Fixing Open Shares Can Help Improve Data Security

Having data open to everyone is a sure-fire way of leaving yourself exposed to potential data breaches or privilege abuse. Unfortunately, many organizations seem to be making the same mistake when it comes to open shares. Fixing open shares can help improve data security, and in this blog, we will find out how. What Are Open Shares? An “open share” is a resource that is accessible to … [Read more...]

Unified Endpoint Management Explained

<p>Nowadays, businesses are constantly seeing increases in the numbers of devices that are being used to access their networks and their sensitive data. As a managed services provider (MSP), you know each of these endpoints has the potential to introduce serious risks into an organization. Read More … [Read more...]

Explained: the strengths and weaknesses of the Zero Trust model

In a US court of law, the accused are deemed to be innocent until proven guilty. In a Zero Trust security model, the opposite is true. Everything and everyone must be considered suspect—questioned, investigated, and cross-checked—until we can be absolutely sure it is safe to be allowed. Zero Trust is a concept created by John Kindervag in 2010 during his time as Vice President and Principal … [Read more...]

IT Security Performance impacts the Boardroom

Cybersecurity has become a frequently debated risk, and according to the World Economic Report is a top-5 risk to world economies and stability. It’s slightly behind other risks such as natural disasters, failure to mitigate climate change, and extreme weather.  Cybersecurity now impacts almost everyone globally, exposes us to significant risks, and has quickly become everyone’s … [Read more...]

Thycotic Amplifies Privileged Access Management for DevOps and Robotic Process Automation

Washington, D.C., January 28, 2020 — Thycotic, provider of privileged access management (PAM) solutions to more than 10,000 organizations, including 25 of the Fortune 100, today revealed new integrations for their high-velocity vault that automates secrets management for DevOps environments. The new release of Thycotic DevOps Secrets Vault now supports connections to key DevOps and robotic … [Read more...]

A breakdown of the GDPR’s six data processing principles

The Regulation stipulates that infringements of “the basic principles for processing, including conditions for consent” are subject to the highest possible administrative fines – up to €20,000,000 or 4% of global annual turnover, whichever is greater. If any detail can get the attention of the people who need to understand this, it is likely that potential fines of that scale will do the job.  The … [Read more...]