Security Strong Passwords Are Essential — But Not Enough An estimated 81% of hacking-related data breaches are due to weak passwords, which have one or more of these characteristics: ,Composed only of numbers ,Composed only of letters ,Too short ,Uses a p... Derick St-Hilaire May 29, 2019
Security Best Practices for Optimizing Cloud Security Companies are migrating business functions to the cloud with increasing regularity. This means the security of consumer and operational data is paramount. Business leaders and IT professionals have a ... Meg Farrow May 14, 2019
Security The Scary List of the Worst Passwords We have some good news, and some bad news. Let's start with the good news. The good news is that Star Wars Episode 9 will be released later on this year, and it looks like Emperor Palpatine will be ba... Derick St-Hilaire May 2, 2019
Security IT Pros: Protect Your End Users from These 7 Notorious Online Scams As an IT pro, you’re probably very capable of steering clear of online scams. However, your non-technical end users may not be so fortunate. And if they get hacked on their personal device, there is a... Derick St-Hilaire April 24, 2019
Security The Ins And Outs Of File-Centric Security In today’s enterprise, securing your organization’s perimeter isn’t enough. You need to think beyond your business’s walls by considering how remote workers, partners, and suppliers are accessing your... Matthew Davis April 16, 2019
Security 7 Cybersecurity Trends We're Likely to See in 2019 Check the calendar, open the nearest window: spring is in the air. That means, alongside your traditional spring clean, it’s time once again to clear out your cyber clutter. Don’t miss this fresh oppo... Patrick Foster April 10, 2019
Security How to Prevent Cybersecurity Disaster in 2019 (What 2018 Taught Us) Cyberattacks continue to increase in both frequency and sophistication. Nefarious parts of the web contain guides that teach people how to perform phishing attacks and ransomware attacks. Furthermore,... Limor Wainstein March 26, 2019
Security The Basics of GDPR Last year around this time, you may recall getting a flurry of emails from various vendors like Google, Apple, and even your friends here at Devolutions, informing you about their obligations and your... Jenny Knafo March 20, 2019
Security Can AI Be the Answer to Data Protection and Private Security ? AI – The Potential Answer to Enterprise, Government, and Personal Security The beauty of AI lies in its ability to learn from previous data. And it uses that previous data to make recommendations and ... Pauline Farris March 13, 2019
Security NIST Changes Course and Advises Against Regularly Changing Passwords The U.S. National Institute of Standards and Technology (NIST) has updated its recommendations for user password management, and some of the advice is causing quite a stir across the InfoSec world. O... Max Trottier March 12, 2019
Security SOC 2 Certification – We’re Almost There! Recently, we highlighted that we have added 2FA to Devolutions Cloud, and we plan on expanding 2FA across all of our products in the coming months. Today, we take a deeper look at another major securi... Jenny Knafo February 28, 2019
Security The Basics of Zero Trust Architecture + 8 Best Practices The conventional approach to information security is to deploy enforcement mechanisms at the network perimeter, such as next-generation firewalls, proxy servers, network intrusion detection systems, a... Joey Dupont February 27, 2019
Security Devolutions Under the Hood - SSO for Devolutions Account As part of our ongoing focus on helping Sysadmins and other IT professionals enhance security and strengthen governance, I am delighted to announce that we have integrated Single Sign-On (SSO) for Dev... Jenny Knafo February 21, 2019
Security 5 Cybersecurity Quick Wins One of the defining features of cybersecurity is that it is an ongoing (read: endless) commitment vs. a one-time event. Despite this, many IT security professionals are under extreme pressure to produ... Max Trottier February 19, 2019
Security Principle of Least Privilege (POLP): What, Why & Best Practices The principle of least privilege (POLP) is a policy in which end users are given only the amount of access they need to carry out their jobs — nothing more and nothing less. Understandably, some end u... Joey Dupont January 29, 2019
Security Password Manager vs. Privileged Access Management (PAM) vs. Single Sign-On (SSO) It’s been said that in life, it’s the simple things that really matter — like watching a lovely sunset or playing with your cat. But sometimes life gets complicated, like when you’re trying to figure ... Jenny Knafo December 20, 2018
Security The Critical Importance of Privileged Identity Management (PIM) As security and risk management (SRM) professionals know — and sometimes have a difficult time getting end users, customers, and other stakeholders to understand and accept — the most important piece ... Max Trottier December 13, 2018
Security Why a Simple Hack Can Destroy Customer Trust In recent years, trust in general online security has taken a significant hit. Many high-visibility hacks and data leaks have led people (quite sensibly) to fear for the safety of their information. A... Patrick Foster October 16, 2018
Security 4 Reasons Why Giving Everyone Administrative Rights is a Bad Idea In the offline world, we don’t let just anyone wander around our offices looking into files and opening drawers and cabinets. We have role-based security to keep things safe and secure. However, in th... Derick St-Hilaire September 26, 2018
Security What are SPHINX and DE-PAKE? Introduction I recently came across the “SPHINX: A Password Store that Perfectly Hides from Itself” white paper that was released by IACR’s ePrint repository in July 2018. To be honest, I was not “tha... Martin Lemay September 18, 2018