Security

Malware Basics: What You Need to Know

Before you can protect your devices and organization against malware attacks, you need to know what you're fighting against – and I’m sorry to say, but it's really scary. It kind of makes the Night Ki...

HR-Role-Cyber-Security-Tips

What's the Role of HR in Cybersecurity and Why Is It Important?

You may think that cybersecurity is something big companies have to invest in. While that’s partly true, you may also have to think about cybersecurity. Ransomware like Petya can cost a company tens o...

robust security on cloud

Robust IT Security Comes to the Cloud

For several years, the business argument to elevate platforms, apps and data to the public cloud has been characterized by the “Yes, it’s a great idea, but what about security?” narrative. Let’s start...

Business-Stalkerware-Spyware-Threats

The Threat Stalkerware Poses to Your Business

Learn how installing spyware presents a massive security risk that extends far beyond a privacy nightmare – and how to protect yourself and your business. A jealous spouse reads his wife’s text messag...

2019-Challenges-Facing-CIOs-IT-Leaders

Big Challenges Facing CIOs and IT Leaders in 2019

Over the past 3 decades, we’ve watched information technology radically transform the workplace. It has changed how we view business processes and given us an appreciation of the far-reaching efficien...

SQL Server with Integrated Security – That's So 2015...

During the early stages of Remote Desktop Manager’s development, focus was set on click-next-to-continue deployment and ease of use. We can all agree that the IT field has changed drastically these pa...

Strong-Passwords-Strong-Enough-Devolutions

Strong Passwords Are Essential — But Not Enough

An estimated 81% of hacking-related data breaches are due to weak passwords, which have one or more of these characteristics: ,Composed only of numbers ,Composed only of letters ,Too short ,Uses a p...

Best-Practice-Optimizing-Cloud-Security

Best Practices for Optimizing Cloud Security

Companies are migrating business functions to the cloud with increasing regularity. This means the security of consumer and operational data is paramount. Business leaders and IT professionals have a ...

Scary-List-Worst-Passwords-Devolutions

The Scary List of the Worst Passwords

We have some good news, and some bad news. Let's start with the good news. The good news is that Star Wars Episode 9 will be released later on this year, and it looks like Emperor Palpatine will be ba...

Protection-Against-7-Notorious-Online-Scams

IT Pros: Protect Your End Users from These 7 Notorious Online Scams

As an IT pro, you’re probably very capable of steering clear of online scams. However, your non-technical end users may not be so fortunate. And if they get hacked on their personal device, there is a...

Ins-Outs-File-Centric-Security-Devolutions

The Ins And Outs Of File-Centric Security

In today’s enterprise, securing your organization’s perimeter isn’t enough. You need to think beyond your business’s walls by considering how remote workers, partners, and suppliers are accessing your...

2019-7-Cybersecurity-Trends-Devolutions

7 Cybersecurity Trends We're Likely to See in 2019

Check the calendar, open the nearest window: spring is in the air. That means, alongside your traditional spring clean, it’s time once again to clear out your cyber clutter. Don’t miss this fresh oppo...

How Prevent Cybersecurity Disaster 2019

How to Prevent Cybersecurity Disaster in 2019 (What 2018 Taught Us)

Cyberattacks continue to increase in both frequency and sophistication. Nefarious parts of the web contain guides that teach people how to perform phishing attacks and ransomware attacks. Furthermore,...

The Basics of GDPR

Last year around this time, you may recall getting a flurry of emails from various vendors like Google, Apple, and even your friends here at Devolutions, informing you about their obligations and your...

AI Data Protection Private Security

Can AI Be the Answer to Data Protection and Private Security ?

AI – The Potential Answer to Enterprise, Government, and Personal Security The beauty of AI lies in its ability to learn from previous data. And it uses that previous data to make recommendations and ...

NIST Advise Against Regularly Changing Passwords

NIST Changes Course and Advises Against Regularly Changing Passwords

The U.S. National Institute of Standards and Technology (NIST) has updated its recommendations for user password management, and some of the advice is causing quite a stir across the InfoSec world. O...

SOC 2 Certification – We’re Almost There!

Recently, we highlighted that we have added 2FA to Devolutions Cloud, and we plan on expanding 2FA across all of our products in the coming months. Today, we take a deeper look at another major securi...

Best Practices Zero Trust

The Basics of Zero Trust Architecture + 8 Best Practices

The conventional approach to information security is to deploy enforcement mechanisms at the network perimeter, such as next-generation firewalls, proxy servers, network intrusion detection systems, a...

Devolutions Under the Hood - SSO for Devolutions Account

As part of our ongoing focus on helping Sysadmins and other IT professionals enhance security and strengthen governance, I am delighted to announce that we have integrated Single Sign-On (SSO) for Dev...

Cyber Security Quick Wins

5 Cybersecurity Quick Wins

One of the defining features of cybersecurity is that it is an ongoing (read: endless) commitment vs. a one-time event. Despite this, many IT security professionals are under extreme pressure to produ...