[NEW] IT Security Glossary of Terms
One of the signature characteristics of the IT landscape is the sheer volume of unique terms that are used on a regular basis. Indeed, to outsiders it can seem like IT pros are speaking a completely...
One of the signature characteristics of the IT landscape is the sheer volume of unique terms that are used on a regular basis. Indeed, to outsiders it can seem like IT pros are speaking a completely...
The mantra for many hackers these days isn’t “go big or go home.” Instead, it’s “good things come in small packages” — because they are setting their sights on small and mid-sized businesses (SMBs).
If you have a smart home, then there is a chance that you are in fact allowing several security risks to live rent-free in your home.
We keep hearing that the cybercrime landscape is getting worse. But just how bad have things become? We scoured a variety of sources to reveal the terrifying reality of cybercrime in 2022.
Every IT pro knows that strong IT security is absolutely, categorically, and unquestionably essential.
IT pros repeatedly tell end users never to click on suspicious links. And this is a warning that should always be heeded!
Devolutions note that DVLS, RDM, and Hub can help organizations protect PHI by leveraging centrally managed access controls, audit and accountability features, and strong authentication mechanisms.
As part of our longstanding commitment to security and transparency, we commission multiple third-party audits. Here's more information about the AICPA SOC2 Type-II report!
The latest edition of Remote Desktop Manager 2022.1 is now compliant with FIPS 140-2 Annex A approved encryption functions.
In the IT world, the terms cybersecurity and IT security are often misused and have their own respective definitions and contexts.
A critical vulnerability was discovered in the Apache log4j project (CVE-2021-44228).
In the James Bond franchise, spies are elegant and sophisticated subversives who can climb treacherous mountains, outswim killer sharks, and even defeat enemies with a handy bagpipe flamethrower. But ...
123456. Qwerty. Iloveyou. No, these are not exercises for people who are brand new to typing. Shockingly, they are among the most common passwords that end users choose in 2021. Yes, you read that cor...
Once in a cafe, there was a dialogue between a waiter and a visitor: - I asked not for chicken, but beef, and not half-cooked, but fried. - Yes, that is a mistake, sorry, but everything is fresh here,...
Recently, my colleague Marc-Olivier looked at some interesting and exciting IT trends in 2021. Unfortunately, technology is not only evolving to make our lives better — cyberthreats are also advancing...
Until a few decades ago, it was common for people to spend their entire career working for a single employer — often starting from the bottom and working their way up through the ranks until retiring....
In our last cybersecurity post on Devolutions, which explained how our MDR service works, we received a lot of great feedback. But we repeatedly got one question that surprised us: “Why would I ever t...
Legendary crooner Frank Sinatra — and a countless number of inebriated wedding guests who fancy themselves as karaoke superstars — have grabbed the mic and belted out the classic song My Way, which in...
It is not malware. It is not spyware. It is not Trojans. It is not even DDoS. No, according to experts the title of the scariest beast on the cyberthreat landscape now belongs to ransomware. What is R...
There are some horror movie franchises that get scarier and scarier with each release. Well, the cybercrime landscape is like that: just when you think that things are as frightening as they can get…t...