Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/11   Introducing Citrix Secure Private Access Organizations need to rethink their approach to security, embracing zero trust, and at the same time make it seamless for employees to access apps securely from anywhere, at any time, and from any device. https://bit.ly/3oNuFUp The Business Benefit of Implementing an ITM Program (Proofpoint) Whether intentional or not, the risk of an insider threat incident is very real. Yet, the risk level is often minimized until it’s too late. And f... read more.

  • October 15, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/4 Introducing the Industry’s First Self-Service, Storage-as-Code Platform (Pure Storage) Pure Fusion is an industry-first, self-service, autonomous storage-as-code platform that marries the best of enterprise storage with the agility and scalability of the cloud. https://bit.ly/3uEsaV5 CISA Kicks Off Cybersecurity Awareness Month CISA kicked off Cybersecurity Awareness Month today, following a proclamation by President Biden designating October as a time for the public and private secto... read more.

  • October 08, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/27 Google Issues Warning For 2 Billion Chrome Users Google published the news in a new blog post, where it revealed Chrome’s 11th ‘zero day’ exploit of the year has been found (CVE-2021-37973) and it affects Linux, macOS and Windows users. https://bit.ly/3AMEdSI Citrix Workspace SAML 2.0 support is now generally available With Citrix Workspace supporting SAML 2.0, you can seamlessly integrate users via Single Sign-On (SSO) with a broad range of identity and authentication pro... read more.

  • October 04, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/20 Don’t Let Cybersecurity Cracks Become Major Breaches (CyberArk) By maximizing your endpoint security posture with a layered security approach, your organization can reduce risk and uncertainty and protect your digital “house”. https://bit.ly/2XFZA9X How to Mitigate an Accidental Insider Threat (Proofpoint guest blog) Though malicious insider threats often get the most attention, they only comprise 14% of all insider threat incidents. Accidental insider threats, however, ac... read more.

  • September 24, 2021

By Gotham, Posted in Security

This is a guest blog from Proofpoint, a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. Today’s organizations face a variety of challenges and security risks, ranging from ransomware to phishing campaigns. For this reason, many organizations invest significant time and resources to detect and prevent external threats. But one area that is often overlooked is the insider threat. There are three primary types of insider threats: Malicious:... read more.

  • September 20, 2021

By Gotham, Posted in Security

This is a guest blog from Proofpoint, a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. Today’s organizations face a variety of challenges and security risks, ranging from ransomware to phishing campaigns. For this reason, many organizations invest significant time and resources to detect and prevent external threats. But one area that is often overlooked is the insider threat. There are three primary types of insider threats: Malicious:... read more.

  • September 20, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/13 So your company just upgraded to Citrix Workspace. Now what? Citrix Workspace comes with a suite of tools to make your job easier — and your employees’ jobs. Now you can manage web and SaaS apps alongside the Windows apps you’ve been managing within Citrix Virtual Apps and Desktops. https://bit.ly/2XihZJC New Application Security Report Outlines the Biggest Challenges for DevSecOps (Fortinet) For business-critical workflows, organizations look to enable access from any dev... read more.

  • September 17, 2021

By Timothy Karl, Posted in Infrastructure, Storage, Support

One of the common issues I see in VDI are FSLogix profile disks taking up a lot of space. Users’ profiles grow organically over time as they use VDI. If an IT administrator doesn’t monitor and perform regular maintenance on the profile shares, they can run out of space. When this happens, users are unable to log on and active profiles start to become corrupted. Adding more storage can temporarily get things back online; however, that might not always be an option as adding more storage and expan... read more.

  • September 16, 2021

By Michael Hawkins, Posted in Security

It is worth revisiting some of the basics of ransomware in order to remind ourselves of why we need so many security controls to protect against it. How does ransomware get into our computers? The most common path is through an email that contains attachments that are infected with the malware. In this scenario, infected PDF files are very common, but Microsoft Word and Excel files and other types are seen also. Another common infection path is browsing to an infected web site. These sites will usually pop... read more.

  • September 13, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/30 What’s new with Citrix Workspace – August 2021 Recently, our teams have added new features and solutions associated with some of our most popular services. These are designed to improve the hybrid experience. Let’s dive in and take a closer look at what’s new with Citrix Workspace for August. https://bit.ly/3gKfGFW Pandemic-Related Email Scams Are on the Rise (Proofpoint) As vaccines became widely available in the spring and early summer, COVID concerns dwindled dram... read more.

  • September 10, 2021