Security

Best Practices Zero Trust

The Basics of Zero Trust Architecture + 8 Best Practices

The conventional approach to information security is to deploy enforcement mechanisms at the network perimeter, such as next-generation firewalls, proxy servers, network intrusion detection systems, a...

Devolutions Under the Hood - SSO for Devolutions Account

As part of our ongoing focus on helping Sysadmins and other IT professionals enhance security and strengthen governance, I am delighted to announce that we have integrated Single Sign-On (SSO) for Dev...

Cyber Security Quick Wins

5 Cybersecurity Quick Wins

One of the defining features of cybersecurity is that it is an ongoing (read: endless) commitment vs. a one-time event. Despite this, many IT security professionals are under extreme pressure to produ...

Principle Least Privilege POLP Explained

Principle of Least Privilege (POLP): What, Why & Best Practices

The principle of least privilege (POLP) is a policy in which end users are given only the amount of access they need to carry out their jobs — nothing more and nothing less. Understandably, some end u...

Password Manager vs. Privileged Access Management (PAM) vs. Single Sign-On (SSO)

It’s been said that in life, it’s the simple things that really matter — like watching a lovely sunset or playing with your cat. But sometimes life gets complicated, like when you’re trying to figure ...

The Critical Importance of Privileged Identity Management (PIM)

As security and risk management (SRM) professionals know — and sometimes have a difficult time getting end users, customers, and other stakeholders to understand and accept — the most important piece ...

Simple Hack Can Destroy Customer Trust

Why a Simple Hack Can Destroy Customer Trust

In recent years, trust in general online security has taken a significant hit. Many high-visibility hacks and data leaks have led people (quite sensibly) to fear for the safety of their information. A...

Giving Everyone Administrative Rights Bad Idea

4 Reasons Why Giving Everyone Administrative Rights is a Bad Idea

In the offline world, we don’t let just anyone wander around our offices looking into files and opening drawers and cabinets. We have role-based security to keep things safe and secure. However, in th...

Sphinx DePake Security Explained Devolutions

What are SPHINX and DE-PAKE?

Introduction I recently came across the “SPHINX: A Password Store that Perfectly Hides from Itself” white paper that was released by IACR’s ePrint repository in July 2018. To be honest, I was not “tha...

7 Critical Features PAM Solution

7 Critical Features to Look for in a Privileged Access Management Solution

Several years ago, to defend against hackers, it was fine for organizations to rely on anti-virus software, secure web gateways, firewalls, and other perimeter-based security tools. But these days, it...

Educate Users About Good Password Policies

5 Tips to Educate Users About Good Password Policies

Data breaches are happening all the time, in both big enterprises and even more so in SMBs – which experts view as “ground zero” for cyber crime. As a result, developing good password policies is esse...

HELP I’ve Been Hacked!" 7 Steps to Follow ASAP

Recently, I posted an article covering the 10 signs of a hack. It was designed for IT pros to share with end users, so they could be proactive vs. reactive. This new article is also for end users, and...

Are You Being Hacked? 10 Signs to Watch For

This should delight all of the wordsmiths and Jeopardy! fans out there: the word “hack” dates back to the 12th century, and derives from the Old English word “tohaccian”, which means “to hack to piece...

Understanding Remote Desktop Protocol Theaths

[VIDEO] Understanding Remote Desktop Protocol Threats

The recently reported hack of LabCorp – one of the largest blood testing labs in the U.S. – has raised some legitimate questions about the defense strategies of corporations in an era when cyber attac...

3-Things Employees Leaves Organization

5 Things to Do When an Employee Leaves Your Organization

For all kinds of reasons, turnover is a fact of life. Even companies that routinely make “Best Employers” lists like Google and Costco need to be prepared for when — not if — an employee heads for the...

3 Things Onboarding New Employees

3 Things to Do Before Onboarding New Employees

Adding a new team member is exciting — especially if they know how to play foosball! Of course, it’s always nice to say “welcome aboard” by having a team lunch, assigning a mentor, or viewing an orien...

Re Think Privileged Access Management

Is It Time to Rethink Privileged Access Management?

Privileged Access Management (PAM) helps organizations achieve two key objectives: restricting access to privileged accounts and maintaining compliance. PAM is especially vital these days because, in ...

7 Best Worst Password Practices 2

Best of the Worst Password Practices

Don’t you hate it when your boss tells you thereasons cyber security is so importantand that the organization must adopt a stronger password policy? Seriously — who is your boss trying to impress? The...

4 Types Security Tools Devolutions

4 essential security tools everyone should be using: protect your data

Discover the four essential security tools everyone should be using to protect their data. Learn about firewalls, antivirus software, and password management solutions to enhance your cybersecurity.

Ten password best practices for systems administrators

Top 10 password policies and best practices for system administrators

Discover the top 10 password policies and best practices to ensure secure authentication and protect sensitive data. Learn effective strategies to enhance password security and prevent breaches.