Linux is one of the best known and most used open source operating systems. The key advantages of using Linux servers are that they are stable, secure, compatible, and customizable. Since Linux servers form the backbone of any IT infrastructure, if there is a sudden spike in memory or CPU usage, the performance of your […]
OpManager now supports SMSEagle, Twilio, and Clickatell, so you can get SMS alerts anywhere!
IT admins need to know the status of their IT devices, servers, routers, switches, and firewalls. To meet this need, OpManager has a highly responsive and robust notification and alerting system that sends alerts via email, Slack, and even SMS. Gateway SMS notifications to the rescue Murphy’s law says anything that can go wrong will […]
Five worthy reads: Embracing Zero Trust during a pandemic
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. With the rising concern over cybersecurity in remote work, this week we explore the concept of the Zero Trust model in cybersecurity. The traditional concept of network security involved classifying networks into internal and external networks […]
What’s so bad about the NXNSAttack DNS Amplification Attack?
How did NXNSAttack Against DNS Services get Noticed? In May 2020, the NXNSAttack was identified as a new DDoS attack on DNS servers by the cybersecurity researchers at Tel Aviv University. The NXNSAttack exploits the vulnerability at recursive DNS resolvers and triggers an amplification attack to other recursive DNS servers and authoritative DNS servers by […]
New Phishing Attack Targets 200M+ Microsoft 365 Accounts Via Malicious Excel .SLK Files to Bypass Security
Using an old (but supported) Excel filetype, attackers can bypass both Exchange Online Protection and Advanced Threat Protection to run malicious macros. Security researchers at Avanan have discovered a new attack method where cybercriminals send phishing emails that contain what appears to be an Excel spreadsheet. The file is actually an SLK file – a […]
New Calendar Invitations as Phishbait Attack Wave
BleepingComputer warns that cybercriminals are using calendar invites to send phishing links to Wells Fargo customers. Researchers at Abnormal Security discovered this phishing campaign in mid-June, and it’s targeted more than 15,000 people. The attackers are sending emails purporting to come from Wells Fargo that inform the recipient that they need to update their security […]
Minimize business losses by monitoring your applications’ performance
Downtime is the biggest nightmare for organizations that capitalize on technology. A study about enterprise outages found that nearly 96 percent of enterprises had faced downtime in the past three years. Businesses lose a minimum of $1.55 million annually and 545 hours of staff time due to IT downtime. Up to 51 percent of downtime […]
Three reports to ensure your project plans are failproof
Efficient project planning is an important skill for project managers. It helps you get things done on time, make iterations, and develop contingency plans for emergencies. Efficient project planning also helps you analyze risks; set and convey to stakeholders clear, realistic, and achievable goals within a given sprint; proactively assess threats that can disrupt your […]
Overcoming VPN bandwidth and capacity complications using Firewall Analyzer
As companies move towards a flexible, remote work environment, the demand for VPN services has increased considerably. This need to ramp up VPN infrastructures in such a short time comes with its fair share of operational problems and security concerns. Over purchasing VPN capacity would put a dent in the IT budget while under purchasing […]
The missing link to comprehensive endpoint security
Very few things available online are truly free of cost. If you don’t pay with cash, chances are you are paying with your personal information or other data. The Chrome web store is filled with free extensions that users install on their browsers to enhance their online experience. However, more and more of these extensions […]