Blog

Security

ITAM and Endpoint Security: You Can’t Manage, Secure, and Effectively Defend Against What You Don’t Know You Have

IT Asset Management (ITAM) is inextricably linked to endpoint security. In fact, as shown below, the first two of the Center for Internet Security’s Top 5 Critical Security Controls emphasize just how crucial it is to understand what devices you have and what software is running on them. These contr

Read more...

Operational IT and Security – Breaking the Siloed Approach

Due to the ever-increasing cyber security risk, many organizations are employing security teams, with the goal of defining security policies and detecting and remediating security risks. In addition, most organizations also employ IT operations teams, with the objective of making the business produc

Read more...

To Encrypt or Not to Encrypt, that Is the Question

Encrypting has been a problem faced by every IT team. It’s been around so long even Shakespeare wrote about it! From dealing with the complaints from Sales that you slowed down their demo boxes, to having to enter the Recovery Key for George for the umpteenth time, we all ask ourselves if encrypting

Read more...

October Patch Tuesday 2018

Microsoft has given us a ‘Fall Break’ this October with a very light set of updates. We have one zero-day vulnerability and one publicly disclosed vulnerability and NO security updates for Adobe Flash this month... a break indeed! The zero-day vulnerability is CVE-2018-8453. This vulnerability exis

Read more...

Application Control – Are We There Yet?

Every now and again, a technology comes along that just makes sense and you wonder how you ever got by without it. Calculators, Fortnite, and GPS I recall, as a child, my first time using a calculator and realising that this device was going to change my life and eliminate the drudgery of the mult

Read more...

Security and ITSM: A Dynamic Duo of IT

Throughout the rich history of IT, the elements of Security and IT Service Management have been front and center in our daily operations. The mission of securing and managing IT infrastructure and assets while delivering services is timeless—and will continue to be at the heart of the IT strategy an

Read more...

Want to Increase Your Security? Start Thinking Like a Hacker

Do you ever feel overwhelmed when it comes to updating your software? Not sure where to start and what to do first? Or maybe you’re not sure if the malware protection and other tools and processes you’ve used in the past are still providing the proper security? If so, it may be time to look at your

Read more...