Security

[NEW] IT Security Glossary of Terms

One of the signature characteristics of the IT landscape is the sheer volume of unique terms that are used on a regular basis. Indeed, to outsiders it can seem like IT pros are speaking a completely...

5 Reasons Why Hackers Target SMBs

The mantra for many hackers these days isn’t “go big or go home.” Instead, it’s “good things come in small packages” — because they are setting their sights on small and mid-sized businesses (SMBs).

7 Smart Home Security Risks that Could Be Living Rent-Free in Your Home

If you have a smart home, then there is a chance that you are in fact allowing several security risks to live rent-free in your home.

20 Shocking Cybercrime Statistics - 2022 Edition

We keep hearing that the cybercrime landscape is getting worse. But just how bad have things become? We scoured a variety of sources to reveal the terrifying reality of cybercrime in 2022.

IT Pros - 5 Reasons to Help You Convince Your Boss to Invest in Strong IT Security

Every IT pro knows that strong IT security is absolutely, categorically, and unquestionably essential.

7 Reasons Why Nobody — Not Even IT Pros — Should Click on Suspicious Links

IT pros repeatedly tell end users never to click on suspicious links. And this is a warning that should always be heeded!

Devolutions’ Statement Regarding PHI and HIPAA

Devolutions note that DVLS, RDM, and Hub can help organizations protect PHI by leveraging centrally managed access controls, audit and accountability features, and strong authentication mechanisms.

Another Year, Another SOC2 Type-II Report for Devolutions Password Hub!

As part of our longstanding commitment to security and transparency, we commission multiple third-party audits. Here's more information about the AICPA SOC2 Type-II report!

Remote Desktop Manager Now Complies with FIPS 140-2 Annex A Approved Encryption Functions

The latest edition of Remote Desktop Manager 2022.1 is now compliant with FIPS 140-2 Annex A approved encryption functions.

Cybersecurity vs. IT Security: What’s the Difference?

In the IT world, the terms cybersecurity and IT security are often misused and have their own respective definitions and contexts.

Critical vulnerability log4j devolutions blog

Critical Vulnerability in Log4j

A critical vulnerability was discovered in the Apache log4j project (CVE-2021-44228).

Spyware what to do about it devolutions blog

Spyware: What It Is, What It Does & What to Do About It

In the James Bond franchise, spies are elegant and sophisticated subversives who can climb treacherous mountains, outswim killer sharks, and even defeat enemies with a handy bagpipe flamethrower. But ...

Why passwords haven't disappeared yet devolutions blog

Why Passwords Haven’t Disappeared Yet & What Organizations Should Do About It

123456. Qwerty. Iloveyou. No, these are not exercises for people who are brand new to typing. Shockingly, they are among the most common passwords that end users choose in 2021. Yes, you read that cor...

Building your way to devsecops devolutions blog

Building Your Way to DevSecOps

Once in a cafe, there was a dialogue between a waiter and a visitor: - I asked not for chicken, but beef, and not half-cooked, but fried. - Yes, that is a mistake, sorry, but everything is fresh here,...

Evolution of phishing devolutions blog

The Evolution of Phishing: Why It’s Getting Worse & How to Fight Back

Recently, my colleague Marc-Olivier looked at some interesting and exciting IT trends in 2021. Unfortunately, technology is not only evolving to make our lives better — cyberthreats are also advancing...

Importance of leaving strategy devolutions blog

Does Your Organization Have a Strategy for Employee Departures?

Until a few decades ago, it was common for people to spend their entire career working for a single employer — often starting from the bottom and working their way up through the ranks until retiring....

Trust third party cybersecurity devolutions blog

Should You Trust a Third Party with Your Cybersecurity?

In our last cybersecurity post on Devolutions, which explained how our MDR service works, we received a lot of great feedback. But we repeatedly got one question that surprised us: “Why would I ever t...

5 common cybersecurity mistakes devolutions blog

5 Common Cybersecurity Mistakes SMBs Make — and How to Fix Them

Legendary crooner Frank Sinatra — and a countless number of inebriated wedding guests who fancy themselves as karaoke superstars — have grabbed the mic and belted out the classic song My Way, which in...

Ransomware attacks on the rise devolutions blog

Ransomware Rising: What’s Happening & How to Protect Your Organization

It is not malware. It is not spyware. It is not Trojans. It is not even DDoS. No, according to experts the title of the scariest beast on the cyberthreat landscape now belongs to ransomware. What is R...

20 shocking cybercrime statistics devolutions blog

20 Shocking Cybercrime Statistics: 2021 Edition

There are some horror movie franchises that get scarier and scarier with each release. Well, the cybercrime landscape is like that: just when you think that things are as frightening as they can get…t...