Security

10 Reasons to Strengthen Identity Security with Single Sign-On (SSO)

We are living through historic times. I can’t believe that one day we will tell our kids: “I remember when people fought for toilet paper during the COVID-19 pandemic.” Or actually, our kids may be ev...

7-Lessons-Learned-from-Biggest-Data-Breaches-2020

7 Lessons Learned from the Biggest Data Breaches of 2020

Recently, we looked at some of the biggest data breaches of 2020. Here is a recap of some of the most notable incidents: ,300,000 users were impacted by a mass account hijacking campaign at Nintendo...

Biggest-Data-Breaches-2020

The Biggest Data Breaches of 2020

It goes without saying that the biggest story of 2020 — or make that the 21st century so far — was the coronavirus pandemic. However, while that crisis raged on, hackers did not go into “lockdown mode...

Importance-of-Using-Password-Manager

The Importance of Using a Password Manager

Recently, Devolutions surveyed decision-makers in SMBs worldwide on a variety of key cybersecurity practices and trends. Answers to each question are presented in this report and highlighted in this i...

8-Browser-Extensions-Protect-Your-Privacy

8 Browser Extensions to Protect Your Privacy

Apple CEO Tim Cook has said: “Our own information is being weaponized against us with military efficiency. Every day, billions of dollars change hands and countless decisions are made on the basis of ...

survey-report-infographic

The State of Password Security in 2020-2021 for SMBs: The Good, the Bad & the Ugly

Social-Media-Breaches-So-Far-in-2020

Social Media Breaches So Far in 2020

There are still a few months left in 2020, but already this year we have seen several high-profile social media data breaches, including: ,In February, Twitter suspended a large network of fake acco...

MDR-Showdown-Developer-vs-Reseller-ntegrators

MDR Showdown: Developers vs. Reseller/Integrators

The ecosystem of companies offering safety oversight services is diverse. There are IT outsourcers that provide security services as an add-on to other IT services (networking, etc.). There are firms ...

The-Devolutions-Ultimate-Cybersecurity-Guide

The Devolutions Cybersecurity Guide

The cybersecurity field is broad and constantly growing. To help you stay on top of best practices, tips, tricks, and warnings, we are pleased to provide this Cybersecurity Guide. It is a curated coll...

Why-SMBs-Need-to-Implement-SoD-to-Improve-IT-Security

Why Segregation of Duties Is a Must for SMBs + Best Practices and Policies

Today’s hackers aren’t just targeting enterprises and governments. They’re also launching attacks against SMBs, and the reason is very simple: due to their relatively small size and limited funds, SMB...

TUTORIAL: How to Generate Secure Self-Signed Server and Client Certificates with OpenSSL

For testing purposes, it is necessary to generate secure self-signed server and client certificates. However, I have found that many tutorials available on the web are complicated, and they do not cov...

privileged-account-abuse-signs-to-watch-for

Privileged Account Abuse: Who’s Doing It, Signs to Watch For & How to Reduce the Risk

Users with privileged account access are given “the keys to the kingdom” — or at least the keys to valuable floors and rooms in the kingdom — so they can be more productive and efficient while carryin...

hackers-are-targeting-smb

[COVID-19] Hackers Are Targeting SMBs During the Pandemic & How to Fight Back

Before the world became gripped by the coronavirus pandemic, SMBs were already viewed as “ground zero” for cybercrime. Here are some alarming numbers: ,Two-thirds of SMBs have suffered a cyberattack...

What-Are-the-Benefits-of-Cloud-Visibility

What Are the Benefits and Challenges of Improving Cloud Visibility?

The cloud is nothing new in the world of technology and it has already become mainstream. Organizations of all sizes store their data in the cloud and use various cloud-based solutions for different p...

[UPDATE] 10 Password Management Best Practices

Technology isn’t the only thing that needs an update every once in a while. Password management best practices do as well, since the information security landscape — and unfortunately, the tactics and...

Why-Password-Reset-Is-Not-the-Most-Efficient

Why Account Brokering Is a Better Option than Resetting Passwords + How Devolutions Can Help

For several years, resetting passwords (a.k.a. account rotation) has been a standard best practice. For those outside the IT security world, this involves automatically generating a new password each ...

Hackers-Are-Targeting-Remote-Workers-During-the-Coronavirus-Pandemic

[COVID-19] 10 Tips to Stay Safe from Cyber Threats While Working from Home

In the past, remote workers — who were typically called teleworkers or telecommuters — were the rare exception, and the envy of folks who had to endure a miserable commute, or slog away from 9-5 in a ...

Top5-Strong-Cybersecurity-Policy-Beatrix-Potter

5 Elements of a Strong Cybersecurity Policy

For any company in the digital age, cybersecurity is an obvious area of concern. If your company holds any kind of sensitive or otherwise valuable information — such as identity documents, personal re...

5-Dangers-Leaving-Password-Management-Employees

5 Dangers of Leaving Password Management to Employees

Employees who can “manage themselves” are highly valued. After all, nobody wants to (or should want to) micro-manage every little thing an employee does. Micro-managing is not only tedious for everyon...

Prevent-Breaches-by-Negligent-Employees

How to Prevent Breaches Caused by Negligent Employees

Everyone knows that the cyber threat landscape is constantly getting worse. But what may come as a surprise is that the enemy isn’t just hackers who populate the dark web. It’s also negligent employee...