• 18 Apr 2018

    Stop Manually Imaging Your Windows Tablets

    Get reliable, automated imaging for Windows tablets and other UEFI systems using KACE SDA and KACE SMA.
    • 9 Apr 2018

    What’s Predictive Business Continuity? We Explain…

    Learn what Predictive Business Continuity is and how it can help you meet your most pressing IT challenges.
    • 5 Apr 2018

    Don’t let Ransomware Handcuff your Data

    Everyday we see another story about an organization whose data is being held for ransom by bad actors. Usually all it takes is for someone to click on an attachment without thinking to install ransomware. Maybe they “found” a USB thumb-drive at their local Starbucks and thought hey it's my lucky day. There are not only attacks coming from without your organization, but also from within. A disgruntled employee...
    • 7 Feb 2018

    Episode 2: Ransomware! The Cost of Doing Nothing

    Welcome to Episode #2 of Two Techs on a Quest , the Quest podcast where two IT pros embark on an epic quest to provide guidance to those seeking resiliency and security for their infrastructure realms. In this episode, our heroes find themselves on th...
    • 30 Jan 2018

    How to Detect and Mitigate PowerShell-Based Cyber Attacks in Your Infrastructure with InTrust

    Probably everyone in the IT world heard at least something about mimikatz – a PowerShell library for performing targeted attacks in Microsoft Windows infrastructure. There are numerous other PowerShell toolkits developed to help attackers to recon, to stay undetected and to perform attacks. Some of the attack vectors can be identified by clever threat detection software that monitors user behavioral patterns to...
    • 25 Jan 2018

    [Transcript] Preparing for the Disgruntled Privileged User — 3 Ways They Can Hose Your Environment in Minutes

    Did you miss our recent webcast: Preparing for the Disgruntled Privileged User - 3 Ways They Can Hose Your Environment? Get the Transcript or Webcast Download.
    • 8 Jan 2018

    2018 Cyber Security Trends – The Rise and Risks of Insider Threats

    Cyber security threats from external attackers are a constant worry for all organizations, as evidence by the many recent, headline-grabbing Ransomware data breaches such as WannaCry, Petya, Bad Rabbit . However, today’s most damaging cyber security threats are not just originating from malicious outsiders or malware, but from insider threats . In fact, according to the 2018 Insider Threat Report by Cybersecurity...
    • 5 Jan 2018

    Modernization and Cyber Security — 2018 IT Priorities for the Federal Government

    The push for IT modernization at federal agencies is converging with the need for stronger cyber security. And the demands to achieve those goals as quickly and cost-effectively as possible are equally pressing. Enhancing security, improving service delivery, and making more efficient use of resources are the key goals in the American Technology Council’s draft report on federal IT modernization . The White House’s...
    • 22 Dec 2017

    Can multiple emails be used to access one Spotlight Cloud account?

    Spotlight on SQL Server Enterprise users would like to share the instances that are being monitored by Spotlight to their bosses and other employees without installing the Spotlight client on their desktop. The question is, how can this be done? Does the Spotlight Cloud ( www.spotlightessentials.com ) have this feature available? Can multiple emails be used to access one Spotlight Cloud account? Yes, multiple emails...
    • 29 Nov 2017

    5 Steps to Patch Automation

    It is a given that machines must be patched; however, it is never as simple as just turning on patching and hoping for the best. There are many things to consider when designing a patching system for your network. As with many organizations, you pro...
    • 22 Nov 2017

    Welcome to Two Techs on a Quest!

    In our new weekly podcast, Two Techs on a Quest , our IT heroes embark on an epic quest to provide tech guidance to those seeking resiliency and security for their infrastructure realms. Braving the perilous landscape of IT, they must battle monstrous IT challenges in hopes of empowering the people against the evil empire of misinformation. Will they succeed? Will they fail? Only time will tell. This epic quest starts...
    • 14 Nov 2017

    What are the security risks involved when uploading data to the Spotlight Cloud?

    In the Information Technology world, we often ask ourselves, "What are the security risks involved uploading data to the Cloud?" With the Spotlight Cloud services, you can now monitor all your SQL Server Connections on your mobile device or from a browser at https://www.spotlightessentials.com . Monitoring features include a Heatmap, an Alarms List, Alarm Details and the ability to Snooze, or Acknowledge alarms...
    • 6 Nov 2017

    5 Myths about Unified Endpoint Management – Debunking them with KACE

    Myths are cool. I heard a lot of myths and legends as bedtime stories when I was growing up, then studied them for years in high school and college. But nowadays, most of the myths I hear are about endpoint management and how it’s too difficul...
    • 31 Oct 2017

    Endpoint Management in a Mobile World – What Does the Future Hold for Admins?

    When it comes to endpoint management, I’m fond of the saying, “You can’t manage what you can’t measure.” But what if you can’t even see it? Or report on it? Or remediate it when it’s been compromised? Our re...
    • 24 Oct 2017

    Trick or Threat? 4 Easy Steps to Patch for a Threat

    Are threats scaring you this Halloween? Let's make them a little less scary by patching those endpoints. KACE users know patching on a regular monthly or weekly schedule will help keep the boogieman at bay. However, there are times, such as a full moon that a threat may arise that needs immediate attention. We will not be using any garlic or silver bullets to protect our endpoints. With a few quick steps, we can push...
    • 5 Sep 2017

    How to Secure Your Endpoints: Mix, Match and Customize

    Software updates and patch management got you down? Seems like new ransomware, malware and viruses lurk around every corner these days, and software companies are releasing patches in swarms to keep up. In addition, computing environments are more c...
    • 30 Aug 2017

    Azure Active Directory syncing to on-premises AD: Is it as secure as you think?

    The cloud. Those of us in IT for any length of time have been hearing about this elusive creature for a decade or more now. At first, we rejected it. “That’ll never happen. My infrastructure isn’t going into the cloud!” Sound familiar? It should; I’ve said it myself many times. But time marches on, and so does technology. So fast forward to today’s IT world, and we find ourselves...
    • 16 Aug 2017

    Privilege Manager for Windows 4.1 is Now Available!

    We are excited to announce a new version of Privilege Manager for Windows 4.1 is now available for download. Look what's new: Temporary Session Elevation - Privilege Manager now supports passcodes, allowing admins to provide temporary machine-wide elevated privileges to end-users Added support for Server 2016 Added support for SQL Server 2016 Check out this helpful knowledge article: What's new...
    • 4 Aug 2017

    Simplify Healthcare M&A with Automated AD and Exchange Tools

    Simplify your healthcare mergers and acquisitions with secure and automated tools for Active Directory and Exchange consolidations.
    • 1 Aug 2017

    Healthcare Mergers and Acquisitions: A Prescription to Improve Security Before Migration

    Several forces are combining to create a historic period of consolidation in the healthcare industry. Increased competition, a shift to outcomes-based reimbursement models, and an overall need to widen the scope of care while reducing costs are driving more and bigger M&A deals. In fact, according to Thomson Reuters, healthcare M&A deals totaled US$672.9 billion during 2015, which was a 71% increase from 2014...
    • 19 Jul 2017

    Endpoint Systems Management - Covering the Full Life Cycle

    A few years ago, we were blown away by how far technology had taken us. Well, today it’s unreal. Every day we interact with countless interconnected mobile devices, laptops, tablets and desktop computers, all laden with a wide range of applications, connecting to numerous servers on premises and in the cloud — and it’s all now become the status quo of doing business. What this means for systems administrators...
    • 1 Jun 2017

    Three Simple Ways to Protect your Network from Ransomware

    With the recent WannaCry ransomware attacks, endpoint security is at the top of everyone’s mind. Soon enough, there will be another malware variant with another catchy name. These attacks are not limited to large corporations; every computer o...
    • 31 May 2017

    5 Key Trends of Insider Threats

    Highly publicized insider data theft, such as the past security breaches including the Edward Snowden incident, highlight the increasing need for better security practices and solutions to reduce the risks posed by insider threats . The 2016 In...
    • 16 May 2017

    ‘WannaCry’ Attack – Another Microsoft Environment of Yours May Not Be Secure

    If you’ve connected to headline news in any way - watch, listen, or read - since last Friday then you must have heard about the massive cyber-attack - WannaCry – a ransomware attack on Microsoft Windows operating systems that have infected more than 300,000 computers in 150 countries. This malware infects Windows PCs by locking the user out of accessing their files and data and demanding a payment –...
    • 28 Mar 2017

    Investigating and Recovering from a Security Breach in Your Hybrid AD and Azure AD

    Most organizations that migrate to Office 365 have done so in a hybrid environment—on-premises AD and Azure AD. Perhaps the most challenging aspect is managing and securing the entire surface area. Many organizations begin the process by creating systems that allow them to: Continually assess access privileges Detect and report suspicious activity Remediate access issues and mitigate repeat occurrences ...