Security

Pros and cons of fingerprint recognition

Pros and cons of fingerprint recognition technology

Explore the pros and cons of fingerprint recognition technology for secure authentication. Understand its benefits and limitations to make decisions about using biometric security in your systems.

4 Key Cloud Security Challenges in 2021 & How to Deal With Them

While drawing conclusions is difficult — and in many cases unwise — given how uncertain things have been over the last 18 months, one significant fact is indisputable: more organizations are rising to...

Protecting RDP passwords from Mimikatz with Remote Credential Guard

Protect RDP passwords from Mimikatz attacks with Remote Credential Guard. Follow our guide to configure this feature in Remote Desktop Manager and boost your remote access security.

Gartner Lists Top Security and Risk Management Trends in 2021

Gartner has revealed its list of the top security and risk management trends that will shape the business landscape in 2021. There are eight trends in total, which have been grouped into three categor...

[IMPROVED FEATURE] Increased Security of the API: Remote Desktop Manager with Devolutions Web Login

I am pleased to highlight that in the latest version of Remote Desktop Manager version 2021.1, we have increased the level of security for the API that pairs Remote Desktop Manager with Devolutions We...

Security-advisories

[NEW] Security Advisories

Here at Devolutions, one of our core values is to be transparent in our actions across the organization. As part of this commitment, today I am pleased to announce that going forward, we will be publi...

MDR-Right-Solution-for-Your-Organization

Is an MDR the Right Solution for Your Organization?

Managed Detection and Response (MDR) is an outsourced cybersecurity management service that provides organizations with 360-degree visibility into security and proactive detection of cyber threats. MD...

Remote-Working-is-here-to-stay

How Remote Working Is Permanently Changing the Business Landscape

For more than a year now, people have been craving a “return to normal,” both professionally and personally. And while there is reason to be cautiously optimistic that things are stabilizing, some asp...

Ten ways to increase vpn security

10 ways to increase VPN security

Boost your VPN security with our top 10 tips. Learn how to implement 2FA, stop DNS leaks, and use the best protocols to ensure your data remains protected while using a VPN.

SolarWinds-Solorigate-lessons-learned

SolarWinds & Solorigate: What Happened, Why it Matters & What Happens Next

There are so many data breaches these days, that they all seem to morph together into an endless cycle of cyber destruction. Indeed, we have gone from being shocked at stories about hacks (remember Ta...

10 Reasons to Strengthen Identity Security with Single Sign-On (SSO)

We are living through historic times. I can’t believe that one day we will tell our kids: “I remember when people fought for toilet paper during the COVID-19 pandemic.” Or actually, our kids may be ev...

7-Lessons-Learned-from-Biggest-Data-Breaches-2020

7 Lessons Learned from the Biggest Data Breaches of 2020

Recently, we looked at some of the biggest data breaches of 2020. Here is a recap of some of the most notable incidents: ,300,000 users were impacted by a mass account hijacking campaign at Nintendo...

Biggest-Data-Breaches-2020

The Biggest Data Breaches of 2020

It goes without saying that the biggest story of 2020 — or make that the 21st century so far — was the coronavirus pandemic. However, while that crisis raged on, hackers did not go into “lockdown mode...

Importance-of-Using-Password-Manager

The Importance of Using a Password Manager

Recently, Devolutions surveyed decision-makers in SMBs worldwide on a variety of key cybersecurity practices and trends. Answers to each question are presented in this report and highlighted in this i...

8-Browser-Extensions-Protect-Your-Privacy

8 Browser Extensions to Protect Your Privacy

Apple CEO Tim Cook has said: “Our own information is being weaponized against us with military efficiency. Every day, billions of dollars change hands and countless decisions are made on the basis of ...

survey-report-infographic

The State of Password Security in 2020-2021 for SMBs: The Good, the Bad & the Ugly

Social-Media-Breaches-So-Far-in-2020

Social Media Breaches So Far in 2020

There are still a few months left in 2020, but already this year we have seen several high-profile social media data breaches, including: ,In February, Twitter suspended a large network of fake acco...

MDR-Showdown-Developer-vs-Reseller-ntegrators

MDR Showdown: Developers vs. Reseller/Integrators

The ecosystem of companies offering safety oversight services is diverse. There are IT outsourcers that provide security services as an add-on to other IT services (networking, etc.). There are firms ...

The-Devolutions-Ultimate-Cybersecurity-Guide

The Devolutions Cybersecurity Guide

The cybersecurity field is broad and constantly growing. To help you stay on top of best practices, tips, tricks, and warnings, we are pleased to provide this Cybersecurity Guide. It is a curated coll...

Why-SMBs-Need-to-Implement-SoD-to-Improve-IT-Security

Why Segregation of Duties Is a Must for SMBs + Best Practices and Policies

Today’s hackers aren’t just targeting enterprises and governments. They’re also launching attacks against SMBs, and the reason is very simple: due to their relatively small size and limited funds, SMB...