Very few things available online are truly free of cost. If you don’t pay with cash, chances are you are paying with your personal information or other data. The Chrome web store is filled with free extensions that users install on their browsers to enhance their online experience. However, more and more of these extensions […]
Five worthy reads: Leveraging IoT to target pain points in the healthcare industry
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. Most healthcare facilities already use the Internet of Things (I0T) to make their environment a more efficient and safer place, and this week, we show you how IoT is revolutionizing the healthcare industry. As the world’s […]
Five worthy reads: Privacy in pandemic management
Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we explore the data privacy challenges and concerns that have arisen during the COVID-19 pandemic. In the wake of COVID-19, the world has witnessed the power of technology. Almost all governments have leveraged […]
What do we talk about when we have password problems?
Chat 1 Employee 1: Hi, admin. Employee 1: I forgot my password. Can you reset it for me? I’ve raised a ticket too. IT admin: *sigh* Chat 2 Employee 2: Hello, admin. Can you unlock my account? I’ve raised a ticket too. IT admin: How many times did you enter the password knowing it was […]
Patch Tuesday June 2020—The largest ever, with fixes for 129 vulnerabilities
Almost four months into the COVID-19 pandemic, all of us have started embracing the “new normal.” In terms of IT security, this means a huge spike in cybercrime and newfound challenges in securing devices that are now being used for remote work. With IT service giants like Cognizant succumbing to cyberattacks, regular patching is […]
Why Zero Trust in IAM is the new way forward
The increasing adoption of cloud applications and an expanding remote workforce are redefining network security. In a traditional setting, the emphasis was on perimeter-based security—assuming that everything behind the corporate firewall is safe. However, it’s clear that organizations have to rethink the philosophy of implicit trust in a corporate network. Created by Forrester Research, the […]
Curtail security exploits in applications and fortify your remote endpoints
The trend of working from home has hit the ground running, and businesses have turned to strategies and tools that will ensure a no-plummet productive environment. There are two major forks in the road when it comes to provisioning remote endpoints—users can use their own devices, or the company can hand over corporate-owned devices. Given […]
The right way to track technician performance
Amid concerns of resource scarcity and increasingly complex resolution processes, service desks are constantly under pressure to deliver more with less. This, in effect, forces service desk managers to drive technicians to resolve requests faster, leading to an unhealthy obsession with numbers. Several service desks are known to regard the number of requests closed by […]
GCP monitoring and alerting with Applications Manager
Google Cloud Platform (GCP), a suite of cloud computing services offered by Google, launched in 2008. It is a powerful cloud platform that offers Infrastructure as a Service (IaaS), Platform as a Service, and serverless computing environments. Many companies are now using GCP to build, modernize, and scale their businesses. GCP monitoring with Applications Manager […]
How to choose the right compliance management software for your business
While keeping data safe from modern cyberthreats is difficult enough, you also have to keep in mind compliance with common regulations, i.e., ensuring your company’s compliance to SOX, which deals with transparency in disclosures from public companies. Nowadays, it’s not enough for businesses to rely on dismissive financial documents that satisfy the intermittent audit; you […]