Security

What-and-Why-You-Need-EDR

What Is EDR and Why Do You Need It?

In today’s volatile technology landscape, threat actors use poorly-secured endpoints as a backdoor into the network. These attackers take advantage of the fact that most endpoints are operated and mai...

Top-3-Information-Security-Risks-2019

Top 3 Information Security Risks to Know About in 2019

Information Security (InfoSec) is the only thing that stands between your information and data catastrophes. Most attacks nowadays target data due to the increasing importance it has on the survival o...

Keeping-Workers-Safe-from-Cyberthreats-Tips

10 Tips to Keep Remote Workers Safe from Cyber Threats

In the past, remote workers — who were typically called teleworkers or telecommuters — were the rare exception, and the envy of folks who had to endure a miserable commute, or slog away from 9-5 in a ...

Malware Basics: What You Need to Know

Before you can protect your devices and organization against malware attacks, you need to know what you're fighting against – and I’m sorry to say, but it's really scary. It kind of makes the Night Ki...

HR-Role-Cyber-Security-Tips

What's the Role of HR in Cybersecurity and Why Is It Important?

You may think that cybersecurity is something big companies have to invest in. While that’s partly true, you may also have to think about cybersecurity. Ransomware like Petya can cost a company tens o...

robust security on cloud

Robust IT Security Comes to the Cloud

For several years, the business argument to elevate platforms, apps and data to the public cloud has been characterized by the “Yes, it’s a great idea, but what about security?” narrative. Let’s start...

Business-Stalkerware-Spyware-Threats

The Threat Stalkerware Poses to Your Business

Learn how installing spyware presents a massive security risk that extends far beyond a privacy nightmare – and how to protect yourself and your business. A jealous spouse reads his wife’s text messag...

2019-Challenges-Facing-CIOs-IT-Leaders

Big Challenges Facing CIOs and IT Leaders in 2019

Over the past 3 decades, we’ve watched information technology radically transform the workplace. It has changed how we view business processes and given us an appreciation of the far-reaching efficien...

SQL Server with Integrated Security – That's So 2015...

During the early stages of Remote Desktop Manager’s development, focus was set on click-next-to-continue deployment and ease of use. We can all agree that the IT field has changed drastically these pa...

Strong-Passwords-Strong-Enough-Devolutions

Strong Passwords Are Essential — But Not Enough

An estimated 81% of hacking-related data breaches are due to weak passwords, which have one or more of these characteristics: ,Composed only of numbers ,Composed only of letters ,Too short ,Uses a p...

Best-Practice-Optimizing-Cloud-Security

Best Practices for Optimizing Cloud Security

Companies are migrating business functions to the cloud with increasing regularity. This means the security of consumer and operational data is paramount. Business leaders and IT professionals have a ...

Scary-List-Worst-Passwords-Devolutions

The Scary List of the Worst Passwords

We have some good news, and some bad news. Let's start with the good news. The good news is that Star Wars Episode 9 will be released later on this year, and it looks like Emperor Palpatine will be ba...

Protection-Against-7-Notorious-Online-Scams

IT Pros: Protect Your End Users from These 7 Notorious Online Scams

As an IT pro, you’re probably very capable of steering clear of online scams. However, your non-technical end users may not be so fortunate. And if they get hacked on their personal device, there is a...

Ins-Outs-File-Centric-Security-Devolutions

The Ins And Outs Of File-Centric Security

In today’s enterprise, securing your organization’s perimeter isn’t enough. You need to think beyond your business’s walls by considering how remote workers, partners, and suppliers are accessing your...

2019-7-Cybersecurity-Trends-Devolutions

7 Cybersecurity Trends We're Likely to See in 2019

Check the calendar, open the nearest window: spring is in the air. That means, alongside your traditional spring clean, it’s time once again to clear out your cyber clutter. Don’t miss this fresh oppo...

How Prevent Cybersecurity Disaster 2019

How to Prevent Cybersecurity Disaster in 2019 (What 2018 Taught Us)

Cyberattacks continue to increase in both frequency and sophistication. Nefarious parts of the web contain guides that teach people how to perform phishing attacks and ransomware attacks. Furthermore,...

The Basics of GDPR

Last year around this time, you may recall getting a flurry of emails from various vendors like Google, Apple, and even your friends here at Devolutions, informing you about their obligations and your...

AI Data Protection Private Security

Can AI Be the Answer to Data Protection and Private Security ?

AI – The Potential Answer to Enterprise, Government, and Personal Security The beauty of AI lies in its ability to learn from previous data. And it uses that previous data to make recommendations and ...

NIST Advise Against Regularly Changing Passwords

NIST Changes Course and Advises Against Regularly Changing Passwords

The U.S. National Institute of Standards and Technology (NIST) has updated its recommendations for user password management, and some of the advice is causing quite a stir across the InfoSec world. O...

SOC 2 Certification – We’re Almost There!

Recently, we highlighted that we have added 2FA to Devolutions Cloud, and we plan on expanding 2FA across all of our products in the coming months. Today, we take a deeper look at another major securi...