5 simple steps to securing your remote employees

As remote working has become standard practice, employees are working from anywhere and using any device they can to get the job done. That means repeated connections to unsecured public Wi-Fi networks—at a coffee shop or juice bar, for example—and higher risks for data leaks from lost, misplaced, or stolen devices. Think about it. Let’s say your remote employee uses his personal smart … [Read more...]

Compromising vital infrastructure: water management

It’s probably unnecessary to explain why water management is considered part of our vital infrastructure, but it’s a wider field than you might expect—and almost every one of its components can be integral to our survival. We all need clean water to drink. As much as I like my coffee, I can’t make it with contaminated liquids. And the farmers that grow our coffee need water to irrigate … [Read more...]

Tackling the shortage in skilled IT staff: whole team security

Is your IT department understaffed, overworked, and are you looking for reinforcements in vain? Maybe these hard-to-hire reinforcements can be hired from within, rather than having to outsource or hire expensive, short-term extra help. While this was usually only done if your own staff was falling too far behind, the burden of the shortage of skilled IT staff in the workforce is starting to take … [Read more...]

The IT Guide to Handling BYOD Security Risks in the Workplace

Holding off from adopting a BYOD policy is an uphill battle. In the past five years alone, we’ve seen a number of significant shifts in technology and workplace culture. With these new changes come new security risks, so how do we address them? … [Read more...]

Bring your own security (BYOS): good idea or not?

We’ve talked about the concept of Bring Your Own Device, or BYOD, on the blog before. BYOD is a popular policy whereby employees can bring personally-owned devices, such as laptops, tablets, or smartphones, to work and use them to access data and applications. It helps to cut costs and can increase productivity, but it brings with it many security concerns and implications. Similar in theory … [Read more...]

There’s still time to implement BYOD this year

The year is more than half done, and there is still time to implement initiatives to keep your business moving. In fact, organizations of all sizes are expecting to see more ransomware attempts, as well as digital currency scams trying to steal an owner’s unique passcode or stealing computing power for currency mining in years […] … [Read more...]

Physician, protect thyself: healthcare cybersecurity circling the drain

No one knows you better than you do. But thanks to technology advances and the continued digitization of healthcare data accumulation and sharing processes, we can also honestly say the same about your healthcare provider. Indeed, every time we get in touch with a health professional, data is recorded (either on paper or electronically), entered into a computer, and then stored in a massive … [Read more...]

Download Trial-in-a-Box Hyper-V Virtual Machine with Parallels Mac Management for Microsoft SCCM

We’re excited to announce that a Hyper-V virtual machine with Parallels® Mac Management for Microsoft® SCCM is now available—a pre-built Microsoft SCCM trial environment with a trial version of our plugin for managing Mac computers. This pre-built trial allows you to try our solution without any impact on your Microsoft SCCM infrastructure. It also enables [...] The post Download Trial-in-a-Box … [Read more...]

macOS High Sierra Critical Update with Parallels Mac Management for Microsoft SCCM

Update: Apple® releases macOS® High Sierra security fix for critical root vulnerability for macOS High Sierra 10.13.1 (not impacted: macOS Sierra 10.12.6 and earlier). Make sure to install this update on all macOS computers affected, as described at support.apple.com/en-us/HT208315 As reported on CNET on November 28, 2017, a major bug has been uncovered that allows [...] The post macOS High Sierra … [Read more...]

Considering a bandwidth upgrade? Think twice.

Are you thinking about a bandwidth upgrade? Let’s take a minute to think about why you’re considering this. Is lack of bandwidth the issue? Do you really need more bandwidth? Or do you need to start using the bandwidth you have more efficiently? Let’s say you decide to go with a bandwidth upgrade. The outcome may not be what you expect. When talking to customers, I often use the phrase “Nature … [Read more...]