• 22 Nov 2017

    Welcome to Two Techs on a Quest!

    In our Quest weekly podcast, Two Techs on a Quest, our IT heroes embark on an epic quest to provide tech guidance to those seeking resiliency and security for their infrastructure realms. Braving the perilous landscape of IT, they must battle monstrous IT challenges in hopes of empowering the people against the evil empire of misinformation. Will they succeed? Will they fail? Only time will tell. (Please visit the site...
    • 14 Nov 2017

    What are the security risks involved when uploading data to the Spotlight Cloud?

    In the Information Technology world, we often ask ourselves, "What are the security risks involved uploading data to the Cloud?" With the Spotlight Cloud services, you can now monitor all your SQL Server Connections on your mobile device or from a browser at https://www.spotlightessentials.com . Monitoring features include a Heatmap, an Alarms List, Alarm Details and the ability to Snooze, or Acknowledge alarms...
    • 6 Nov 2017

    5 Myths about Unified Endpoint Management – Debunking them with KACE

    Myths are cool. I heard a lot of myths and legends as bedtime stories when I was growing up, then studied them for years in high school and college. But nowadays, most of the myths I hear are about endpoint management and how it’s too difficul...
    • 31 Oct 2017

    Endpoint Management in a Mobile World – What Does the Future Hold for Admins?

    When it comes to endpoint management, I’m fond of the saying, “You can’t manage what you can’t measure.” But what if you can’t even see it? Or report on it? Or remediate it when it’s been compromised? Our re...
    • 24 Oct 2017

    5 Steps to Patch Automation

    It is a given that machines must be patched; however, it is never as simple as just turning on patching and hoping for the best. There are many things to consider when designing a patching system for your network. As with many organizations, you probably have a group of “road warriors” who are rarely in the office, yet need to have their laptops patched and secured. What about those annoying few who need a...
    • 24 Oct 2017

    Trick or Threat? 4 Easy Steps to Patch for a Threat

    Are threats scaring you this Halloween? Let's make them a little less scary by patching those endpoints. KACE users know patching on a regular monthly or weekly schedule will help keep the boogieman at bay. However, there are times, such as a full moon that a threat may arise that needs immediate attention. We will not be using any garlic or silver bullets to protect our endpoints. With a few quick steps, we can push...
    • 5 Sep 2017

    How to Secure Your Endpoints: Mix, Match and Customize

    Software updates and patch management got you down? Seems like new ransomware, malware and viruses lurk around every corner these days, and software companies are releasing patches in swarms to keep up. In addition, computing environments are more c...
    • 30 Aug 2017

    Azure Active Directory syncing to on-premises AD: Is it as secure as you think?

    The cloud. Those of us in IT for any length of time have been hearing about this elusive creature for a decade or more now. At first, we rejected it. “That’ll never happen. My infrastructure isn’t going into the cloud!” Sound familiar? It should; I’ve said it myself many times. But time marches on, and so does technology. So fast forward to today’s IT world, and we find ourselves...
    • 16 Aug 2017

    Privilege Manager for Windows 4.1 is Now Available!

    We are excited to announce a new version of Privilege Manager for Windows 4.1 is now available for download. Look what's new: Temporary Session Elevation - Privilege Manager now supports passcodes, allowing admins to provide temporary machine-wide elevated privileges to end-users Added support for Server 2016 Added support for SQL Server 2016 Check out this helpful knowledge article: What's new...
    • 4 Aug 2017

    Simplify Healthcare M&A with Automated AD and Exchange Tools

    Simplify your healthcare mergers and acquisitions with secure and automated tools for Active Directory and Exchange consolidations.
    • 1 Aug 2017

    Healthcare Mergers and Acquisitions: A Prescription to Improve Security Before Migration

    Several forces are combining to create a historic period of consolidation in the healthcare industry. Increased competition, a shift to outcomes-based reimbursement models, and an overall need to widen the scope of care while reducing costs are driving more and bigger M&A deals. In fact, according to Thomson Reuters, healthcare M&A deals totaled US$672.9 billion during 2015, which was a 71% increase from 2014...
    • 19 Jul 2017

    Endpoint Systems Management - Covering the Full Life Cycle

    A few years ago, we were blown away by how far technology had taken us. Well, today it’s unreal. Every day we interact with countless interconnected mobile devices, laptops, tablets and desktop computers, all laden with a wide range of applications, connecting to numerous servers on premises and in the cloud — and it’s all now become the status quo of doing business. What this means for systems administrators...
    • 1 Jun 2017

    Three Simple Ways to Protect your Network from Ransomware

    With the recent WannaCry ransomware attacks, endpoint security is at the top of everyone’s mind. Soon enough, there will be another malware variant with another catchy name. These attacks are not limited to large corporations; every computer o...
    • 31 May 2017

    5 Key Trends of Insider Threats

    Highly publicized insider data theft, such as the past security breaches including the Edward Snowden incident, highlight the increasing need for better security practices and solutions to reduce the risks posed by insider threats . The 2016 In...
    • 16 May 2017

    ‘WannaCry’ Attack – Another Microsoft Environment of Yours May Not Be Secure

    If you’ve connected to headline news in any way - watch, listen, or read - since last Friday then you must have heard about the massive cyber-attack - WannaCry – a ransomware attack on Microsoft Windows operating systems that have infected more than 300,000 computers in 150 countries. This malware infects Windows PCs by locking the user out of accessing their files and data and demanding a payment –...
    • 28 Mar 2017

    Investigating and Recovering from a Security Breach in Your Hybrid AD and Azure AD

    Most organizations that migrate to Office 365 have done so in a hybrid environment—on-premises AD and Azure AD. Perhaps the most challenging aspect is managing and securing the entire surface area. Many organizations begin the process by creating systems that allow them to: Continually assess access privileges Detect and report suspicious activity Remediate access issues and mitigate repeat occurrences ...
    • 22 Mar 2017

    Remediating and Mitigating Privileged Access Issues in Your Hybrid AD and Azure AD

    The challenges associated with securing data in Office 365 , whether completely cloud based or a hybrid AD iteration, are numerous, and addressing them requires a solid plan to ensure your risk of a data breach or accidental exposure is minimized. That plan begins with continually assessing permissions to ensure data is only available to those who should have access. It also requires implementation of a system that...
    • 17 Mar 2017

    Detecting and Reporting Security Issues in Hybrid AD and Azure AD—Visibility is Key

    If your organization is running Office 365 in a completely cloud-based or hybrid AD environment, it’s critical to make sure the proper security protocols are in place in both your on-premises AD and Azure AD. The first step is continuously assessing the hybrid AD to determine who has access to permissions, privileged groups, sensitive business groups, Group Policy Objects (GPO) and data at all times. Are you familiar...
    • 13 Mar 2017

    Hybrid AD and Azure AD Security Begins with Continuous Permissions Assessment

    If your organization made the jump to Office 365 and are now completely cloud based or in a hybrid AD environment, you probably spent a lot of time getting your on-premises AD ready for the move . Now that your new cloud or hybrid environment is in place and in good shape, how do you keep it secure? Maintaining security in a cloud or hybrid AD environment is no easy task. Download the Quest e-book Surviving Common...
    • 9 Mar 2017

    Securing Your On-Premises AD for Office 365 Migration

    As we previously discussed, migrating to Office 365 doubles the surface area you’ll need to manage and secure. As a result, it’s critical that any issues with data stored in your on-premises AD are corrected prior to migration. The good news is that making the move to Office 365 offers the opportunity to address any problems that exist while also creating policies that will keep it that way moving forward...
    • 7 Mar 2017

    Office 365 Security: Is On-Premises AD Your Weakest Link?

    Office 365 has more than 60 million active monthly users, and adoption of the platform is increasing—for good reason. It allows organizations to reduce infrastructure and costs related to licensing and maintenance, while expanding storage efficiencies. Additionally, Office 365 empowers workforces to operate from anywhere and from any device, while increasing scalability and business continuity. However, moving...
    • 3 Mar 2017

    Reporting on Office 365 can save your company $$$$$$..

    Alright, you all have been using Office 365 environment for some time now, we guess that adoption rates of all the tools are high and that everyone is using every aspect – correct? I am sorry to say but it is easy to turn on features and raise subscription levels for users that will never use some of the feature set. It’s best to audit who is using what and how to trim away unused license levels to lower levels...
    • 17 Feb 2017

    Securing your Active Directory Environment from the Inside Out. (Part 4)

    Step 4: Control and simplify Group Policy management . Using GPOADmin, you can be very granular with who is allowed to do what with a particular Group Policy. Much like Active Roles, GPOAdmin allows you to grant specific rights to your Administrators and make the changes through a service account. Thus greatly reducing the need to grant the rights natively. Finally, we have secured Active Directory literally from...
    • 13 Feb 2017

    Securing your Active Directory Environment from the Inside Out. (Part 3)

    Okay, we have identified our privileged users and determined what rights are needed for them to do their jobs. Now we need a way to enforce these new roles. Step 3: Simplify the security of your Active Directory Active Roles is an AD proxy. It will sit between the user and Active Directory and determine if the user should be performing the task or not. Since the Active Roles service account is actually making the...
    • 8 Feb 2017

    Secure Automation Using Toad for Oracle

    While Toad for Oracle has had Automation for a long time now it has been necessary to run it on your desktop. While this is an important feature this limitation made it not ideal for organizations where security is imperative, such as in t...