Today, we’re announcing the results of a survey recently commissioned on the state of enterprise security. Conducted by Ultimate Windows Security, the report provides visibility into the uses, concerns and challenges that IT departments face in respect to endpoint security, patching, cloud applications and mobile management.…Read more
I thought I’d begin the year by making some predictions about what to look for in 2016 in the area of IT service management (ITSM).
This is the first of a three-part series on change management. In this blog, I’ll try to answer the question, “What is change management?” from both a process and a benefits (or use-case) perspective.…Read more
One of PayPal’s primary mechanisms to protect accounts from being hacked may have been fundamentally flawed for years.
That’s the concern raised by security researchers who uncovered a method of bypassing PayPal’s two-factor authentication (2FA), the technology that is supposed to protect your account should your username and password fall into the wrong hands.
It’s time to take a serious look at Office 365. The cloud edition of Microsoft’s broadly adopted business productivity suite – which bundles such popular packages as Microsoft Word, Microsoft Excel, Microsoft PowerPoint, and Microsoft Outlook – has been both heavily praised and heavily criticized since its introduction in 2011.…Read more
Here we go again. New releases of Microsoft’s flagship operating system are typically greeted with a combination of angst, curiosity, confusion, and dread in equal measure.…Read more
Question: With hundreds of thousands of new malware samples being analysed every day, and anti-virus software being constantly updated to combat the threat, where might a cybercriminal want to hide their trojan horse from detection?…Read more
All companies strive to integrate new employees as quickly and seamlessly as possible, as a smooth onboarding process allows for greater productivity and overall cost efficiency.…Read more