
Devolutions’ Statement Regarding PHI and HIPAA
Devolutions note that DVLS, RDM, and Hub can help organizations protect PHI by leveraging centrally managed access controls, audit and accountability features, and strong authentication mechanisms.
Devolutions note that DVLS, RDM, and Hub can help organizations protect PHI by leveraging centrally managed access controls, audit and accountability features, and strong authentication mechanisms.
As part of our longstanding commitment to security and transparency, we commission multiple third-party audits. Here's more information about the AICPA SOC2 Type-II report!
The latest edition of Remote Desktop Manager 2022.1 is now compliant with FIPS 140-2 Annex A approved encryption functions.
In the IT world, the terms cybersecurity and IT security are often misused and have their own respective definitions and contexts.
A critical vulnerability was discovered in the Apache log4j project (CVE-2021-44228).
In the James Bond franchise, spies are elegant and sophisticated subversives who can climb treacherous mountains, outswim killer sharks, and even defeat enemies with a handy bagpipe flamethrower. But ...
123456. Qwerty. Iloveyou. No, these are not exercises for people who are brand new to typing. Shockingly, they are among the most common passwords that end users choose in 2021. Yes, you read that cor...
Once in a cafe, there was a dialogue between a waiter and a visitor: - I asked not for chicken, but beef, and not half-cooked, but fried. - Yes, that is a mistake, sorry, but everything is fresh here,...
Recently, my colleague Marc-Olivier looked at some interesting and exciting IT trends in 2021. Unfortunately, technology is not only evolving to make our lives better — cyberthreats are also advancing...
Until a few decades ago, it was common for people to spend their entire career working for a single employer — often starting from the bottom and working their way up through the ranks until retiring....
In our last cybersecurity post on Devolutions, which explained how our MDR service works, we received a lot of great feedback. But we repeatedly got one question that surprised us: “Why would I ever t...
Legendary crooner Frank Sinatra — and a countless number of inebriated wedding guests who fancy themselves as karaoke superstars — have grabbed the mic and belted out the classic song My Way, which in...
It is not malware. It is not spyware. It is not Trojans. It is not even DDoS. No, according to experts the title of the scariest beast on the cyberthreat landscape now belongs to ransomware. What is R...
There are some horror movie franchises that get scarier and scarier with each release. Well, the cybercrime landscape is like that: just when you think that things are as frightening as they can get…t...
To say that the last 18 months have been unkind to many organizations is like saying that the sun is rather warm, or that the Himalayas are somewhat hilly. Frankly, the past year-and-a-half has been b...
While UK law enforcers have been using fingerprint technology to convict people since the early 1900s, as recently as a decade ago, we would have struggled to believe we’d soon all use fingerprint rec...
While drawing conclusions is difficult — and in many cases unwise — given how uncertain things have been over the last 18 months, one significant fact is indisputable: more organizations are rising to...
There was a bit of a stir recently when someone noticed that the password used to connect with RDP remained in memory and therefore could be grabbed by the popular mimikatz tool. The reality is that t...
Gartner has revealed its list of the top security and risk management trends that will shape the business landscape in 2021. There are eight trends in total, which have been grouped into three categor...
I am pleased to highlight that in the latest version of Remote Desktop Manager version 2021.1, we have increased the level of security for the API that pairs Remote Desktop Manager with Devolutions We...