• July 29, 2022

    6 Simple Rules for Securing Your Endpoints 1. Always Be Patching Managing software updates—and specifically patching endpoints—secures your organization from known threats. The appearance of new endpoint types—such as Internet of Things (IoT), Bring Your Own Device (BYOD), and other...

  • February 11, 2020

    Microsoft's February 2020 Patch Tuesday Fixes 99 Security Issues February Patch Tuesday is Here Microsoft have released 99 patches today. There are 12 Critical patches with the remaining marked Important. Support for Windows 7 and Windows Server 2008 (including R2)...

  • February 6, 2020

    Why Endpoint Detection and Response is Getting Harder in 2020 The demand for endpoint detection and response solutions across the globe is currently quite strong, with no signs of slowdown any time soon: Recent research by London-based firm Technavio predicts...

  • December 6, 2019

    Endpoint Security 2020: What You Need to Know The Challenge of Endpoint Security From all accounts, dealing with endpoint security is only going to get harder. In fact, according to an article on SolutionsReview, by Ben Canner, it “looks poised...

  • April 12, 2019

    How to Boost Your Team's Efficiency by Automating IT Processes IT teams are responsible for making sure that all technologies and devices used in the workplace work. And, thanks to the widespread adoption of technology by businesses, almost all tasks...

  • April 1, 2019

    How Endpoint Management Can Keep Your Workplace Secure This article originally appeared on The Hacker NewsWorkplaces have become highly connected. Even a small business could have dozens of devices in the form of desktops, mobile devices, routers, and even smart...

  • February 7, 2019

    View Any IT Issue at a Glance Syxsense's Network Map puts the answer to the IT’s burning questions in a single screen. Can I see every device connected to my network, and how vulnerable to attack are these devices? Through...

  • September 28, 2017

    Even celebrity status can’t protect your data At the beginning of September, a news story broke that Selena Gomez had her Instagram hacked. Why does the Instagram of a celebrity matter this time? Because this hack goes much further. Instagram...

  • August 29, 2017

    1 Million Targeted by Chrome Extension Hack Even experts aren’t exempt from deceptive phishing attacks. It’s being reported that the developers of several extensions had their login credentials stolen. It's the second time in a week that Chrome users have...

  • August 15, 2017

    Hackers Use NSA Tools in Hotels Across Europe A group of Russian hackers best known for breaking into the Democratic National Committee have been using a leaked NSA espionage tool to target hotels across Europe in an attempt to spy...