Reading Time: 3 minutesHere we go again…it should come as no surprise to anyone who follows cybersecurity that another massive cyberattack has occurred,...
Reading Time: 3 minutesWhat is WannaCry 2.0 Ransomware?
WannaCry malware also referred to as WannaCrypt, WanaCrypt0r 2.0 or Wanna Decryptor, is a virus that...
Where flexible thinking is preferable to dogmatism
“The highest good, than which there is no higher, is the blockchain, and consequently it is immutably...
Reading Time: 6 minutesTakeover remote endpoints using ITSM
ITSM’s ‘Takeover’ feature allows administrators to remotely access and control Windows devices to solve issues, install...
Reading Time: 2 minutesFantom, a new ransomware discovered recently, strikes disguised as a legitimate Microsoft Windows update. Thus it tricks users into downloading...
An important step forwards for performance and scalabilityAfter two months of intensive development and testing, we’re proud to release the latest alpha of...
Reading Time: 3 minutesAre you thinking about leaving your “break-fix” business model behind? The latest cloud-based management tools such as offered for free...
Reading Time: 3 minutesThe IT services industry continues to shift from the old, reactive break-fix model to the proactive Managed Services (MSP) approach,...