Endpoint Security

Absolute Offers New Ways to Manage Windows User Profiles
Jason Short
Absolute Offers New Ways to Manage Windows User Profiles

“A chain is only as strong as its weakest link.” We’ve all heard this saying and unfortunately, most of us have also heard it applied to IT security as the chain with users as the weak link. Protecting data from the actions of users – whether intentional or not – has long been one of the greatest challenges IT pros face. Whether it’s via phishing emails, remote work habits...

READ MORE
5 Back-to-School Security Tips for K-12
Juanma Rodriguez
5 Back-to-School Security Tips for K-12

It’s back-to-school season and while students and their families shop for new clothes, backpacks and school supplies, teachers and administrators are also busy outfitting their schools with tools to support a productive and safe school year. There’s no question technology is a core component for creating powerful learning environments. Seventy-five percent of teachers today use technology in their classrooms on a daily basis. But with technology adoption comes risks...

READ MORE
How to Succeed in the Digital Healthcare Frontier
Josh Mayfield
How to Succeed in the Digital Healthcare Frontier

Healthcare is data. To effectively treat patients and create new forms of care, information must be shared, analyzed, and transmitted across several devices, among a number of healthcare professionals, insurance providers and other third parties. The sensitive nature of this personal information has long made healthcare an attractive target to cyber criminals while the complex nature of the industry creates continued struggles to protect the data, as frequent data...

READ MORE
3 Cybersecurity Tips for Summer Travel
Jo-Ann Smith
3 Cybersecurity Tips for Summer Travel

Just because you might be taking a vacation this summer doesn’t mean cyber thieves will do the same. As you and your company’s users prepare to close out your summer travel – for leisure or for work – it’s important to take a few simple precautions that will go a long way in the protection of your data, and your employers. Remember, the hospitality industry is a popular target...

READ MORE
Securing Shadow IT Starts with Automation
Jason Short
Securing Shadow IT Starts with Automation

Shadow IT is a modern security challenge for the very best reasons – your users rely on it to find new and arguably innovative ways to be more productive. While getting more done more effectively isn’t a bad thing, rogue applications that aren’t supported and maintained by IT is. While we haven’t seen Shadow IT in the headlines as much recently, the problem remains very real. Gartner estimated 38%...

READ MORE