Emerging Endpoint Security Trends for SMB

How can SMBs protect their networks and digital assets without breaking the bank?

For all the focus on mega-enterprise security—and all the high-profile data breaches at major corporations—enterprises aren’t alone in the endpoint security battle.

Think about it for a minute. When was the last time you got through a day of e-mail without a spam e-mail with a nefarious link or attachment?

> Read More

State of Enterprise Security Still Shaky Says New Survey

Today, we’re announcing the results of a survey recently commissioned on the state of enterprise security. Conducted by Ultimate Windows Security, the report provides visibility into the uses, concerns and challenges that IT departments face in respect to endpoint security, patching, cloud applications and mobile management.

We polled nearly 700 IT professionals working at enterprise (1,000+ employees),

> Read More

Top 5 Reasons IT Administrators Are Working Too Hard Managing Endpoints


IT administration is a thankless job. Let’s face it—the only time admins gain any recognition is when something goes wrong. In fact, the most successful IT administrators proactively manage very stable environments where very few failures and performance degradations occur. Unfortunately, though, this is rarely the case, and it is far more common for admins to get stuck in the break/fix cycle of reactive “firefighting”

> Read More

Windows 10 – Cause for Confusion

As of August 1, ComputerWorld reported Windows 10 global usage had climbed to 2.5%. Not too shabby for the OS that was launched just three days earlier on July 29. Those numbers easily beat early adoption rates for Windows 8.1 but, I wonder how those users are faring? A quick read of headlines shows a lot ofheadaches ranging from overall privacy concerns to unwanted update files being delivered to networked machines still running Windows 7 or 8.1.

> Read More

How Service Automation Improves Security

Service automation refers to an approach to streamline operations via automated processes. While service automation has been widely sought by companies for its ability to reduce costs and increase productivity, this technology also makes corporations more secure. How? First, let’s consider how the discovery of a security threat would be handled by a company without service automation.

> Read More

Mitigating the Consequences of Data Loss with Service Automation

In today’s digital age, companies increasingly utilize various external platforms to store and access corporate data. In fact, according to Forbes magazine more than half of all companies in the United States now use some form of cloud computing to conduct daily operations. Executives communicate via email on smartphones, employees access corporate systems on laptops from various locations,

> Read More

The Benefits of Service Automation for Employee Onboarding

All companies strive to integrate new employees as quickly and seamlessly as possible, as a smooth onboarding process allows for greater productivity and overall cost efficiency. The sooner an employee is equipped with the devices, access, and information he or she needs, the sooner meaningful work can begin. Effective onboarding is also important because a company that fails to afford new hires an easy transition provides a poor first impression of corporate operations and imposes unnecessary delays and challenges,

> Read More

BadUSB Update

I have received several inquiries regarding the latest news about the so-called BadUSB vulnerability, so I thought I’d write a quick post on what we know at the moment.

What is BadUSB?

BadUSB is a vulnerability – not malware – in the design and implementation of firmware used on USB devices which allows it to be updated without being vetted.

> Read More

7 Out of Top 10 Internet of Things Devices Riddled With Vulnerabilities

It has become the trendy thing to connect more and more household and office devices to the internet. It is becoming increasingly common to find yourself typing a WiFI password not just into your smartphone, but also your smoke alarm, your fridge, your printer, your baby monitor and maybe even your car.

However,

> Read More

Past, Present and Future of Endpoint Security

In the throes of holiday shopping season, 110 million Target customers woke to the news that cleverly placed malware had pilfered their credit- and debit card numbers, along with other sensitive data. We aren’t yet certain who was behind the massive attack on Target and, evidently other large retailers, or how the heist was orchestrated.

> Read More