In The Trenches Logo The Devolutions Blog
The Front Line Against
IT Chaos & Cyber Threats

Tips & Tricks

Will Biometrics Replace Passwords?

Over the last couple of decades, and especially in the last few years, the use of biometrics as part of identification and access control has been surging. In fact, by the year 2022, the biometric ind...

Best of the Worst Password Practices

Don’t you hate it when your boss tells you the reasons cyber security is so important and that the organization must adopt a stronger password policy? Seriously — who is your boss trying to impress? ...

Wayk Now 2.0 - Introducing Wayk Den

Hello everyone! By now, I hope you’ve had the opportunity to try Wayk Now 2.0, which is the latest version of our flexible, easy-to-use and lightweight instant remote access solution. Wayk Now helps ...

Prevent Insiders from Breaching Your Data

Companies like Yahoo, eBay and Equifax all learned the hard way that protecting your data from hackers is of the utmost importance. I mean, a data leak can ruin your company’s reputation forever. But...

The Basics: How to Manage Credentials

When it comes to managing credentials in RDM, there’s no “one size fits all” method. The optimal approach depends on several factors, including your organization’s security policies and compliance re...

The Basics: Data Sources

Hi everyone, As you probably know, I usually blog about new and improved RDM features. However, we don’t want to ignore those of you who are new to RDM (and for those who are thinking of giving it a t...