August Poll Results: What’s Your Favorite IT Hack?
Luke Skywalker has The Force. Spiderman has Spidey Sense. Wolverine has Primal Instincts. And IT Pros? Well, they too have something that makes them unique and amazing: IT Hacks!Last month, we asked...
View ArticleSeptember Poll: What’s the Most Realistic-Looking Cyber Scam You’ve Ever Seen?
Some cyber scams are easy to spot — like the ones that end up in your SPAM folder and claim to be from “PayePall”, or from yet another fleeing ambassador (those guys sure have a lot of money stashed...
View ArticleThe Problems with Browser's Password Manager and How To Turn It Off
Do you know how some ideas seem good in theory, but are bad in practice? For example, many of us have experienced the regret of eating too much pizza, drinking too much beer, or binge watching too many...
View ArticleHow to Turn Off Idle Mode in Devolutions Password Server So It’s Always...
Some things in life are kind of frustrating, like when a picnic is ruined by rain, when you’re waiting for a new game to be released and they keep postponing it, or when you leave your computer for...
View ArticleNew Employee Spotlight: Michel Lambert, Software Developer
Here at Devolutions, we just keep growing and growing and growing (like that drumming pink energizer bunny). Today, it’s my pleasure to introduce you to the latest member of our family. Please give a...
View ArticleIntroducing Devolutions Authenticator: Our New and Free 2FA Companion
At Devolutions, we’re committed to creating products that help you control the IT chaos in your environment, so that you can keep your data, users, customers, and reputation safe from insider threats...
View ArticleThe Devolutions’ Product Saga
We all love sagas, like Star Wars, Star Trek, Lord of the Rings, Harry Potter, Indiana Jones, and The Avengers. It’s interesting and insightful to see how characters and plots develop over time.For...
View ArticleMalware Basics: What You Need to Know
Before you can protect your devices and organization against malware attacks, you need to know what you're fighting against – and I’m sorry to say, but it's really scary. It kind of makes the Night...
View Article10 Tips to Keep Remote Workers Safe from Cyber Threats
In the past, remote workers — who were typically called teleworkers or telecommuters — were the rare exception, and the envy of folks who had to endure a miserable commute, or slog away from 9-5 in a...
View ArticleGartner Publishes Top 10 Security Projects for 2019
Gartner has published its Top 10 Security Projects for 2019. These 10 security projects represent initiatives Gartner believes all organizations that have already implemented fundamental security...
View ArticleHow to Set Up Secure Access in a Specific Remote Desktop Manager Connection
On my ideal vacation, I would spend my days soaking up the sun under palm trees on a gorgeous island, with a bottomless glass of champagne in my hand. And in my ideal IT world, granting and managing...
View ArticleNew Employee Spotlight: Jonathan Iannone, QA Specialist
John Ruskin, the renowned 19th century social thinker, philanthropist, artist, and writer once said: “Quality is never an accident. It is always the result of intelligent action.” We completely agree...
View ArticleTop 3 Information Security Risks to Know About in 2019
Information Security (InfoSec) is the only thing that stands between your information and data catastrophes. Most attacks nowadays target data due to the increasing importance it has on the survival of...
View ArticleWhat Is EDR and Why Do You Need It?
In today’s volatile technology landscape, threat actors use poorly-secured endpoints as a backdoor into the network. These attackers take advantage of the fact that most endpoints are operated and...
View ArticleUsing Devolutions Web Login to Automatically Log Into Your Favorite Websites
Although a recent study suggests that the human brain has the capacity to store the entire Internet, personally, I have my doubts. I can barely remember my own phone number sometimes (how often do I...
View ArticleAugust Poll Results: What’s Your Favorite IT Hack?
Luke Skywalker has The Force. Spiderman has Spidey Sense. Wolverine has Primal Instincts. And IT Pros? Well, they too have something that makes them unique and amazing: IT Hacks!Last month, we asked...
View ArticleSeptember Poll: What’s the Most Realistic-Looking Cyber Scam You’ve Ever Seen?
Some cyber scams are easy to spot — like the ones that end up in your SPAM folder and claim to be from “PayePall”, or from yet another fleeing ambassador (those guys sure have a lot of money stashed...
View ArticleThe Problems with Browser's Password Manager and How To Turn It Off
Do you know how some ideas seem good in theory, but are bad in practice? For example, many of us have experienced the regret of eating too much pizza, drinking too much beer, or binge watching too many...
View Article