Manage IT on the go with our incredibly effective mobile apps

Even an insignificant network issue can wreck havoc on your IT infrastructure when left unmanaged. This makes it vital that your IT team is alerted instantly whenever an issue arises, so they can troubleshoot it quickly, and ensure network stability. However, IT teams aren’t sitting at their desks waiting for problems to happen. It’s not […]

Email Scammers Impersonate U.S. Government Agencies Offering Pandemic Financial Assistance

Taking advantage of people in their time of need, these bottom feeders of the cybercriminal world promise assistance and, instead, collect personal details to make a buck. While the world waits on vaccines to be widely distributed and for the pandemic to finally be over, there are plenty of people that are still hurting financially […]

Optrics Insider – Checkpoint SSL VPN Cert Expired, Undocumented Zyxel Backdoor & Solarwinds Update

 Join Scott Young and Shaun Sturby from Optrics Engineering as they discuss they discuss the SSL certificate for Checkpoint VPN devices that has expired, the undocumented backdoor in Zyxel devices and a Solarwinds update from Bruce Schneier. Timecodes: 0:00 – Intro 0:18 – Today’s 3 topics 0:35 – Topic 1: Checkpoint SSL VPN Cert […]

IT security under attack: Why are group memberships so crucial?

Security groups either make or break your IT security. Group memberships are responsible for administrative access in your your network and define access to other privileged resources and data on your domain. Ever wondered how a simple misconfiguration of a group membership could lead to a security incident? This blog elaborates the most common misconfiguration […]

IT security under attack blog series: Instant domain persistence by registering a rogue domain controller

In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain persistence in AD environments. Dubbed DCShadow, this is a late-stage kill chain attack that allows a threat actor with admin (domain or enterprise admin) credentials to leverage the replication mechanism […]

Protect your organization against Adrozek

Adrozek is a malicious browser modifier that, when installed on users’ machines, infects them with adware. This particular strain of malware has been making rounds since May 2020; according to Microsoft, it was at its peak in August, when as many as 30,000 computers were affected per day. Although classified as adware, Adrozek is also […]

A Friend Needs Money Urgently? You’re Probably Getting Scammed

People need to be on the lookout for phishing attacks sent from legitimate but compromised social media accounts, according to Paul Ducklin at Naked Security. Ducklin describes a scam sent in by a reader who received an unexpected message from one of their Facebook friends. The message said, “Hi [name]. Hope you’re all well. Do […]

Five worthy reads: Decision intelligence for critical business moments

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we explore decision intelligence. AI and analytics are playing critical roles in driving innovation among many businesses riding the digital transformation wave during this pandemic. Many business leaders realize that people are not […]

Wake on LAN with IP address manager: A holistic approach to remote booting

Wake on LAN (WOL) has been a go-to solution for most network admins to ensure an uninterrupted IT resource. Aiding in remote booting of wired and wireless networks, WoL helps optimize energy usage even as it ensures your network resources are readily available. Enabling you to boot your machines on demand, and switch them to […]