Tag: Help Desk
-
Does Your Help Desk Know Who’s Calling?
Phishing, the theft of users’ credentials or sensitive data using social engineering, has been a significant threat since the early days of …
-
SolarWinds warns of attacks targeting Web Help Desk instances
SolarWinds warned customers of attacks targeting Internet-exposed Web Help Desk (WHD) instances and advised removing them from publicly …
-
The Unsettling Reason Why Your Help Desk May Be Your Greatest Security Vulnerability
The enterprise help desk has long been a favorite target for those seeking to use social engineering schemes as a way of penetrating an …
-
From Help Desk to Head of SOC: Building a Cybersecurity Career on Empathy and Candor
With a career in cybersecurity that started over 15 years ago, my work has traversed the security landscape: managing incident responses, …
-
RDmi Is Coming. Here’s How Personas Can Help You Prepare
With the release of Remote Desktop modern infrastructure (RDmi) around the corner and Microsoft Inspire just having finished, there’s a …
-
FocalScope Achieves 24/7 Availability with NAKIVO
FocalScope, a customer support software developer, headquartered in Virginia, USA, is using NAKIVO Backup & Replication to protect their …
-
Building a better help desk: Part 2, secure permission management
Welcome to the next installment of our Building a better help desk blog series. This time we will be discussing how to improve your …
-
What’s New in Horizon View 7.3 and Other
What’s new: Horizon Connection Server Horizon Help Desk Tool View application and process names and resource use within a virtual or published desktop to identify which applications and process are using up machine resources. Read full news article on DABCC
-
Improved Security Management in the Management Portal of RES ONE Workspace 10.1
We introduced a new web-based Management Portal for RES ONE Workspace in the 10.0 release earlier this year. Hopefully you’ve already been working with the new modern, easy-to-use Management Portal and finding its simplified way to identify and troubleshoot issues that occur across the workspace, and gaining increased visibility of how people are interacting with…
●●●