Top News

[NEW FEATURE] Live Thumbnail

If you monitor several Microsoft Windows Servers and workstations via Remote Desktop Manager, then you know that switching between consoles is time-consuming and tedious. Well my dear friends, I have ...

Business-Stalkerware-Spyware-Threats

The Threat Stalkerware Poses to Your Business

Learn how installing spyware presents a massive security risk that extends far beyond a privacy nightmare – and how to protect yourself and your business. A jealous spouse reads his wife’s text messag...

2019-Challenges-Facing-CIOs-IT-Leaders

Big Challenges Facing CIOs and IT Leaders in 2019

Over the past 3 decades, we’ve watched information technology radically transform the workplace. It has changed how we view business processes and given us an appreciation of the far-reaching efficien...

SQL Server with Integrated Security – That's So 2015...

During the early stages of Remote Desktop Manager’s development, focus was set on click-next-to-continue deployment and ease of use. We can all agree that the IT field has changed drastically these pa...

[IMPROVED FEATURE] Remote Desktop Manager Add-on Manager

You know the old saying, “If it ain’t broke, don’t fix it”? Well, here at Devolutions we disagree with that advice. Even if a feature works the way it’s supposed to, we know there’s always room for im...

sysadminotaur-084-job-titles

Sysadminotaur #84: Job Titles

Best Practices for Avoiding Data Breaches and Data Hacks

Recently, we looked at the differences between data breaches and data hacks. We also highlighted some similarities between them, most notably that in the aftermath of a security incident (accidental o...

Strong-Passwords-Strong-Enough-Devolutions

Strong Passwords Are Essential — But Not Enough

An estimated 81% of hacking-related data breaches are due to weak passwords, which have one or more of these characteristics: ,Composed only of numbers ,Composed only of letters ,Too short ,Uses a p...

Data Breach vs. Data Hack

Some things in life have meaningful similarities, but they are not the same — to my fellow GOT fans out there, do you really know the difference between a white walker and a wight? Or the difference b...

RoadMap-to-Privileged-Access-Management-Devolutions

[UPDATE] Devolutions’ PAM Platform for SMBs

As you may have discovered, current Privileged Access Management (PAM) solutions in the marketplace are typically quite expensive, and therefore unaffordable for most small and midsize businesses (SMB...

Best-Practice-Optimizing-Cloud-Security

Best Practices for Optimizing Cloud Security

Companies are migrating business functions to the cloud with increasing regularity. This means the security of consumer and operational data is paramount. Business leaders and IT professionals have a ...

[NEW FEATURE] Session Recording in Remote Desktop Manager

You know that feeling when you really want something, but you have to wait, and wait, and wait some more? That drives me crazy! Ask anyone who knows me, and they’ll tell you that patience is NOT one o...

Poll May Definition True Geek

May Poll: What Is the Definition of a True Geek?

Over the years, the term “geek” has totally changed its image. Once upon a time, it was a massive insult to be branded a geek. Basically, it was like being called a nerd but without the high IQ. But t...

sysadminotaur-083-update

Sysadminotaur #83: Update

RDM-Free-2019_1

Remote Desktop Manager Free 2019.1 is Here!

As you hopefully know, one of the guiding principles here at Devolutions is to help as many IT pros around the world control IT chaos. That’s why we are proud to continue improving Remote Desktop Mana...

StarWars-Quiz2019

[Quiz] How Well Do You Know the Star Wars Movies?

By now, you probably know that I’m huge a Star Wars fan. Need proof? A couple of years ago I created a quiz about the Star Wars’ universe. I also co-manage the Devolutions Force, which is our Star War...

Scary-List-Worst-Passwords-Devolutions

The Scary List of the Worst Passwords

We have some good news, and some bad news. Let's start with the good news. The good news is that Star Wars Episode 9 will be released later on this year, and it looks like Emperor Palpatine will be ba...

History major computer viruses 1970 to today

History of major computer viruses: from the 1970s to today

Explore the history of major computer viruses from the 1970s to the present. Learn about significant cybersecurity threats and how they shaped the evolution of malware and virus protection.

[THE BASICS] Caching in Remote Desktop Manager

Cash: now that’s a word we all know, and of course we all wish we had more of it (speaking of which, joining the Devolutions Affiliates Program is a fun and easy way to get some extra cash!). But toda...

Protection-Against-7-Notorious-Online-Scams

IT Pros: Protect Your End Users from These 7 Notorious Online Scams

As an IT pro, you’re probably very capable of steering clear of online scams. However, your non-technical end users may not be so fortunate. And if they get hacked on their personal device, there is a...