Google has flagged 2.02 million phishing sites since the beginning of the year, averaging forty-six thousand sites per week, according to researchers at Atlas VPN. The researchers note that the number of phishing sites peaked at the start of the year, which correlates with the start of the pandemic. “Data also reveals that in the […]
Fast-track bulk Microsoft 365 object creation with M365 Manager Plus
User account creation is a long-winded process that involves various configurations. Such a tiresome, manual process is naturally prone to errors, especially while creating user accounts in bulk. Errors made in the user provisioning process will result in frustrated users calling the service desk to request permission to access resources, to be added to the […]
5 key benefits of using an IP scanner
In todays IP-centric world, it’s becoming increasingly complex to support network-intensive adaptations like cloud adoption and bring your own device (BYOD) polices. As an IT admin, you’re responsible for scanning and tracking your IP resources to ensure that network devices and end users can be allocated unique IP addresses to access your network. With hundreds […]
WARNING: Americans’ Password Habits are Horrible, Putting Organizations at Risk
New data shows the average American uses short, uncomplicated, and often predictable passwords, practices which only increase the insecurity of corporate user accounts. Today, the password is a primary means of authenticating whether you are the owner of a given account or not. So, it stands to reason that passwords need to be secure. But […]
Tackling your network security challenges using ManageEngine ITOM solutions
Network security management typically entails end-to-end management of the entire network security infrastructure of an enterprise. However, in this rapidly changing security ecosystem, there’s an inherent need for IT admins to be extremely agile to maintain an effective security posture. Going beyond merely installing new security devices, security administrators need to address an ever-expanding matrix […]
Leverage AI and predictive analysis to cut costs and eliminate downtime
With the promise of unprecedented potential, artificial intelligence (AI) and predictive analytics have permeated into every field of business. Due to their ability to help retail staff serve customers better, personalize video recommendations based on users’ preferences, reduce employee churn, and detect fraud and security threats, AI and predictive analysis are rapidly being adapted across […]
New Ransomware, OldGremlin, Coming Soon to an Organization Near You!
Pay attention to this one. Despite only targeting Russian companies, the use of custom self-made malware and decidedly creative phishing campaigns makes them a potential danger. OldGremlin first showed in in late March of this year. Singapore-based GroupIB took note and has been tracking them continually. What makes this new kid on the block so […]
Uptime monitoring: A boon for your business
A highly functional IT network is the basis of any successful modern business, and for effective operations, organizations must monitor the health and availability of all their IT infrastructure components and ensure they’re up and running 24×7. Uptime is the duration during which a network component is reachable and capable of operating efficiently. Typical networks […]
Five worthy reads: Preparing an incident response plan for the pandemic and beyond
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. With the rising concern over cyberattacks in the distributed workforce, this week we explore the concept of cybersecurity incident response during a pandemic. The new normal of a distributed workforce has given rise to advancements in […]
The Risk of Redirector Domains in Phishing Attacks
Researchers at GreatHorn warn that a large-scale phishing campaign is using open redirects to evade email security filters. Open redirects allow attackers to take a URL from a non-malicious website and tack on a redirect, so that when the link is clicked it will take the user to a phishing page. This results in a […]