author:


Security

A Frank Discussion of Multifactor Authentication

February 20, 2019

Someone steals credentials from one of your client’s executives. They guess the username and password to their email account. From there, the cybercriminal can send out targeted phishing emails to compromise even more accounts or trick employees into handing over sensitive data. To combat …


when does an incident becomes problem

author:


ITSM

Enterprise Chatbot Best Practices

February 19, 2019

Learn how chatbots can improve your organizations’ customer service experience. These chatbot best practices will help you plan for implementation and deployment.



author:


Networks

Head in the Sand About Cloud: Part 2

February 18, 2019

Last month I started an analysis about an argument… I mean a “passionate discussion” on social media. My goal in this series is to use that conversation as a framework to explore and solve some sub-optimal thinking patterns that I’ve seen in both beginners …


author:


Database

Using FORCE INDEX: When Your Query Optimizer Gets It Wrong

February 17, 2019

A Guest Post from Jordan Raine, Clio Jordan Raine is a staff software developer at Clio, the leading provider of legal practice management, client relationship management, and client intake software. Clio is dedicated to helping lawyers meet client needs and run efficient, profitable practices. …


author:


Applications

Three Reasons SSO is DevOps’ Best Friend

February 15, 2019

Nearly 200—that’s how many passwords the average business user has according to an article in Security Magazine. When it comes to troubleshooting, having even just two logins is one too many. Quick resolution requires full visibility into all systems. It also requires quick access …



author:


Systems

The Pros and Cons of Open-source Tools

February 15, 2019

Cost plays a factor in most IT decisions. Whether the costs are hardware- or software-related, understanding how the tool’s cost will affect the bottom line is important. Typically, it’s the engineer’s or administrator’s task to research tools and/or hardware to fit the organization’s needs both …


author:


Security

IT Operations: How SecOps Saves the Day

February 13, 2019

Few messages strike fear in the hearts of IT operations staff like the dreaded scan results from your security team. These messages often appear in your inbox early on Monday morning, which means it’s sitting there waiting for you. You’re not even into your …