Blog
The Importance of Network Monitoring in the Internet of Medical Things (IoMT)
Wed, 08/21/2019
Learn why network monitoring software is critical for the Internet of Medical Things (IoMT) and keeping healthcare facilities and hospital networks healthy.
Blog
What Does IBM i 7.4 Have for System Administrators?
Mon, 08/12/2019
Wondering what new features IBM i 7.4 (V7R4) has in store for system administrators? See our list of top picks in this blog post.
Blog
Types of Cyber Threats
Thu, 08/08/2019
What are Cyber Threats?A cyber threat is basically any type of threat that is computer related in nature. To be clear, a computer could be a desktop computer, a laptop, a tablet or even a smartphone. All of these devices have particular types of threats that they can be exposed to that users need to be aware of to ensure that they can protect themselves and their confidential information.Types...
Blog
Benefits of Network Monitoring in Healthcare
By Kevin Jackson on Thu, 08/08/2019
In the world of healthcare, keeping your network healthy is critical to keeping patients healthy. With Intermapper, you can maintain a more secure IT infrastructure that allows you to deliver better care to patients.
Blog
4 Strategies to Enhance Both your Security and Compliance Posture
Thu, 08/01/2019
Running a comprehensive and cost-efficient compliance program whether HIPAA, NIST, FFIEC, PCI, GDPR, or Sarbanes Oxley (to mention a few) is a major headache for most Compliance Teams. Digital Defense offers industry leading vulnerability management and assessment, along with best practice compliance guidance to organizations across all verticals and sizes.With predictions from a recent survey by...
Blog
Microsoft is Right, Mandatory Password Changes are Obsolete
Thu, 08/01/2019
This article was originally published on Help Net Security on August 1 , 2019.Microsoft has recently come out and said that mandatory password changing is ancient and obsolete. This goes directly against everything we were trained to think for the last couple of decades, and against most compliance directives including some of the most dominant security standards. And it is correct.If anything,...
Blog
10 Reasons Linux Attacks Happen and How to Avoid Them
By Bob Erdman on Mon, 07/29/2019
Take a look at why Linux attacks are occurring and what you can do to avoid them.
Blog
What is IPSEC? - Internet Protocol Security Explained
Thu, 07/25/2019
What is IPSEC?In the world of VPNs, there are typically two types that an organization can choose from, IPSEC or OpenSSL. While many people have migrated to OpenSSL mode because of its new relative ease of deployment, there are still companies that deploy IPSEC-based VPNs because of the additional layers of security they provide that are not available in OpenSSL-based VPNs.Why Choose an IPSEC VPN...
Blog
What is PCI Compliance? Requirements & Checklist | Fortra
Fri, 07/19/2019
PCI Compliance is adherence to the set of ground rules set forth in the Payment Card Industry Data Security Standard (PCI-DSS). The standard defines how vendors who accept credit cards are to manage not only the credit card data, but their own networks as well, to ensure that the card data stays protected from theft and abuse.Who Developed The PCI-DSS?The PCI-DSS was developed by the Payment Card...
Blog
What is a Rootkit and How do you Detect Them?
Wed, 07/10/2019
Rootkits – When Bad Turns to UglyFew words strike more fear into the heart of IT administrators than rootkit. Once a rootkit has been discovered, it’s usually a strong indicator that one or more systems on a network have been compromised and that any data being stored on those systems is now suspect or even worse, has been captured by the rootkit attacker to be released “into the wild” of the...
Blog
What Does Db2 Mirror for i Mean for Me?
By Tom Huntington on Wed, 07/10/2019
Take a look at the strengths and weaknesses of IBM’s Db2 Mirror for i and determine how Fortra solutions complement this tool and can further enhance your experience.
Blog
Anti Malware Software Program - What is it?
By Mieng Lim on Tue, 07/09/2019
Anti Malware – A New Type of ProtectionIn today’s world, everyone has heard of antivirus software. This is the same software that has been around for a decade or more that protects computers from infection from viruses and other types of malicious software.However, over the last few years the threat landscape has evolved to the point where having anti-virus software on your computer is not enough....
Blog
Choosing a Document Management Solution: 3 Questions to Ask
By Greg J. Schmidt on Tue, 07/09/2019
Make choosing a document management solution easier with these 3 questions you should ask when determining the best electronic document management system (EDMS) for your business.
Blog
Standing the Test of Time: IBM i on POWER9
By Tom Huntington on Fri, 07/05/2019
The IBM i operating system is proven technology that has stood the test of time since the early days of the System/38 and AS/400 and on through to POWER9. Know the business benefits.
Blog
How to Improve IT Efficiency: 3 Strategies to Keep Services Up and Costs Down
By Per Bauer on Wed, 06/26/2019
Blog
How to Answer Key Capacity Planning Strategy Questions
Fri, 06/21/2019
Anyone who works for a large organization knows that July isn’t just a time for fireworks and BBQs. It’s also when you plan your budget for the next fiscal year.
If you work in IT, you know you’re always expected to have an answer for everything. But when it comes to planning your budget, there are really only two questions that need to be asked.
Do you have enough resources on hand for the...
Vulnerability Research
BlueKeep Vulnerability – Patch Now, Patch Again
Wed, 06/19/2019
With the May 2019 Patch Tuesday release from Microsoft, it was revealed a number of older Microsoft operating systems are vulnerable to a condition known as BlueKeep (CVE-2019-0708). BlueKeep is a Remote Code Execution (RCE) flaw in Remote Desktop Services (RDS)/Remote Desktop Protocol (RDP) allowing code to run with system level access and is potentially “wormable” making it possible for an...
Blog
MSSPs Need the Industry to Evolve to Offer Multi-Tenant Vulnerability Management Solutions for Today’s Dynamic Environments
Wed, 06/19/2019
According to the Verizon Data Breach Investigations Report, published in November 2018, the #1 cause of a breach continues to be vulnerable systems left exposed and unpatched. Preventing the exploitation of vulnerabilities when using an effective solution is one of the few countermeasures that can pro-actively protect your infrastructure before an attack has even started as opposed to relying on...
Blog
The True Cost of Workload-Related Outages
Thu, 06/06/2019
Underestimating the consequences of downtime can be hugely detrimental to your productivity. Accurately calculating those costs won’t just prevent disasters, but also help you effectively manage your capacity planning efforts.