Download: UEM vendor comparison chart 2022

Credit to Author: Bob Violino, Valerie Potter| Date: Tue, 03 May 2022 03:00:00 -0700

Unified endpoint management (UEM) is a strategic IT approach that consolidates how enterprises secure and manage an array of deployed devices including phones, tablets, PCs, and even IoT devices.

To read this article in full, please click here

(Insider Story)

Read more

How to manually update Microsoft Defender

Credit to Author: Ed Tittel| Date: Tue, 04 Jan 2022 03:00:00 -0800

Microsoft Defender is the built-in anti-malware package that’s included with modern Windows operating systems. It’s alternatively known as Windows Security (it shows up under Settings as Windows Security) or Windows Defender (sometimes with Antivirus at the end of the name, as in this Microsoft Docs page). But whatever you want to call it, for many Windows users, this tool is the go-to default for handling security on their PCs.

To read this article in full, please click here

(Insider Story)

Read more

FAQ: Last-minute answers about Windows 7's post-retirement patches

Credit to Author: Gregg Keizer| Date: Tue, 07 Jan 2020 04:53:00 -0800

A week from now, Microsoft will serve customers with the last for-free Windows 7 security update, in effect retiring the 2009 operating system.

However, hundreds of millions of personal computers will still power up thanks to Windows 7 on Jan. 14, and for an indeterminate timespan after that date. Windows 7 may be retiring, but it’s not disappearing.

Microsoft admitted as much more than a year ago when it announced Extended Security Updates (ESU), a program for commercial customers who needed more time to ditch Windows 7. ESU would provide patches for some security vulnerabilities for as long as three years. For a fee.

To read this article in full, please click here

(Insider Story)

Read more

9 steps to lock down corporate browsers

Credit to Author: Peter Wayner| Date: Tue, 23 Jul 2019 03:00:00 -0700

Everyone in the enterprise loves the web browser when it’s delivering news, email, documentation, and sales leads. With the shift to web apps, it’s arguably the most important installed software on any corporate desktop. But the internet is filled with people who aren’t nice — sometimes even dangerous — and the same browser can also bring viruses, rootkits, and worse. Even if the browser sits on a little-used desktop in a dusty corner with no access to sensitive information, an attacker can use the seemingly unimportant machine as a stepping stone.

Keeping your users’ browsers secure is essential. The browser companies work hard to block the attackers by sealing the back doors, side doors, and cracks in between, but that isn’t always enough. Some useful features have dark sides, and enterprises can increase security dramatically by shutting down or tightly limiting access to these options.

To read this article in full, please click here

(Insider Story)

Read more

The top 8 problems with blockchain

Credit to Author: Lucas Mearian| Date: Mon, 08 Jul 2019 03:00:00 -0700

While blockchain holds tremendous potential for creating new financial, supply chain and digital identity systems, it’s often erroneously seen as a panacea for business problems.

The myriad of pilots and proofs of concept by large corporations and government agencies are showing real promise, but those projects don’t always lead to obvious business cases that justify doing something differently. Sometimes a tried and true technology like a relational database can perform the task much more efficiently than a distributed ledger based on peer-to-peer technology that will require complex governance and rules.

To read this article in full, please click here

(Insider Story)

Read more

CIOs, you’re doing blockchain wrong

Credit to Author: Lucas Mearian| Date: Fri, 15 Feb 2019 03:00:00 -0800

IT leaders who’ve taken the plunge into blockchain are mainly deploying it in proofs-of-concept tests to address the same problems a conventional database could handle, according to research firm Gartner.

To read this article in full, please click here

(Insider Story)

Read more

Does Workplace have a Facebook problem?

Credit to Author: Matthew Finnegan| Date: Mon, 11 Feb 2019 03:00:00 -0800

Facebook emerged from 2018 bruised from a series of revelations that undermined trust in the popular social media platform and raised questions about its commitment to privacy.

To read this article in full, please click here

(Insider Story)

Read more

In 2019, look for AI-enabled mobile devices – and a UEM push

Credit to Author: Lucas Mearian| Date: Mon, 07 Jan 2019 03:00:00 -0800

This year, artificial intelligence will continue its push into mobile hardware and enterprise communication devices, challenging IT shops’ enterprise mobility management (EMM) capabilities while at the same time offering potential security benefits.

To read this article in full, please click here

(Insider Story)

Read more