Security

IT Pros - 5 Reasons to Help You Convince Your Boss to Invest in Strong IT Security

Every IT pro knows that strong IT security is absolutely, categorically, and unquestionably essential.

7 Reasons Why Nobody — Not Even IT Pros — Should Click on Suspicious Links

IT pros repeatedly tell end users never to click on suspicious links. And this is a warning that should always be heeded!

Devolutions’ Statement Regarding PHI and HIPAA

Devolutions note that DVLS, RDM, and Hub can help organizations protect PHI by leveraging centrally managed access controls, audit and accountability features, and strong authentication mechanisms.

Another Year, Another SOC2 Type-II Report for Devolutions Password Hub!

As part of our longstanding commitment to security and transparency, we commission multiple third-party audits. Here's more information about the AICPA SOC2 Type-II report!

Remote Desktop Manager Now Complies with FIPS 140-2 Annex A Approved Encryption Functions

The latest edition of Remote Desktop Manager 2022.1 is now compliant with FIPS 140-2 Annex A approved encryption functions.

Cybersecurity vs. IT Security: What’s the Difference?

In the IT world, the terms cybersecurity and IT security are often misused and have their own respective definitions and contexts.

Critical Vulnerability in Log4j

A critical vulnerability was discovered in the Apache log4j project (CVE-2021-44228).

Spyware: What It Is, What It Does & What to Do About It

In the James Bond franchise, spies are elegant and sophisticated subversives who can climb treacherous mountains, outswim killer sharks, and even defeat enemies with a handy bagpipe flamethrower. But ...

Why Passwords Haven’t Disappeared Yet & What Organizations Should Do About It

123456. Qwerty. Iloveyou. No, these are not exercises for people who are brand new to typing. Shockingly, they are among the most common passwords that end users choose in 2021. Yes, you read that cor...

Building Your Way to DevSecOps

Once in a cafe, there was a dialogue between a waiter and a visitor: - I asked not for chicken, but beef, and not half-cooked, but fried. - Yes, that is a mistake, sorry, but everything is fresh here,...

The Evolution of Phishing: Why It’s Getting Worse & How to Fight Back

Recently, my colleague Marc-Olivier looked at some interesting and exciting IT trends in 2021. Unfortunately, technology is not only evolving to make our lives better — cyberthreats are also advancing...

Does Your Organization Have a Strategy for Employee Departures?

Until a few decades ago, it was common for people to spend their entire career working for a single employer — often starting from the bottom and working their way up through the ranks until retiring....

Should You Trust a Third Party with Your Cybersecurity?

In our last cybersecurity post on Devolutions, which explained how our MDR service works, we received a lot of great feedback. But we repeatedly got one question that surprised us: “Why would I ever t...

5 Common Cybersecurity Mistakes SMBs Make — and How to Fix Them

Legendary crooner Frank Sinatra — and a countless number of inebriated wedding guests who fancy themselves as karaoke superstars — have grabbed the mic and belted out the classic song My Way, which in...

Ransomware Rising: What’s Happening & How to Protect Your Organization

It is not malware. It is not spyware. It is not Trojans. It is not even DDoS. No, according to experts the title of the scariest beast on the cyberthreat landscape now belongs to ransomware. What is R...

20 Shocking Cybercrime Statistics: 2021 Edition

There are some horror movie franchises that get scarier and scarier with each release. Well, the cybercrime landscape is like that: just when you think that things are as frightening as they can get…t...

Supply Chain Attacks are On the Rise — Here’s How to Protect Your Organization

To say that the last 18 months have been unkind to many organizations is like saying that the sun is rather warm, or that the Himalayas are somewhat hilly. Frankly, the past year-and-a-half has been b...

What Are the Pros & Cons of Fingerprint Recognition Technology?

While UK law enforcers have been using fingerprint technology to convict people since the early 1900s, as recently as a decade ago, we would have struggled to believe we’d soon all use fingerprint rec...

4 Key Cloud Security Challenges in 2021 & How to Deal With Them

While drawing conclusions is difficult — and in many cases unwise — given how uncertain things have been over the last 18 months, one significant fact is indisputable: more organizations are rising to...

Protecting RDP Passwords from Mimikatz Using Remote Credential Guard

There was a bit of a stir recently when someone noticed that the password used to connect with RDP remained in memory and therefore could be grabbed by the popular mimikatz tool. The reality is that t...