Operations | Monitoring | ITSM | DevOps | Cloud

June 2024

Applying USB-based, Zero-touch Device Provisioning with NinjaOne

Modern provisioning in IT refers to defining your desired settings and software to meet your organizational goals. It’s the process of setting up your IT infrastructure, including hardware, networks, and virtual machines, among others, to make it available to systems and users. Device provisioning is a subset of this, often used to set up devices within the Internet of Things (IoT), including mobile devices. The importance of device provisioning cannot be overstated.

What Is the National Vulnerability Database?

The National Vulnerability Database (NVD) is an information resource provided by the U.S. government that catalogs security vulnerabilities in a standardized, searchable format. It includes databases containing software and hardware products, their known security flaws (including misconfigurations), as well as their severity and impact. The NVD is an important resource for IT professionals to stay up-to-date with potential security concerns in their IT infrastructure.

Container vs Virtual Machines (VM): Key Differences & Overview

Container vs virtual machines – what is there to know? These are key virtualization technologies that are used by developers, system administrators, and increasingly, home users to run applications. While they are similar, they have different use cases and function differently in key ways.

High Availability vs Fault Tolerance: Understanding the Main Differences

High availability vs fault tolerance – what are they? These are two IT concepts that are closely related, but have different requirements and outcomes. This article will explore the difference between high availability (HA) and fault tolerance (FT) in regard to IT infrastructure, highlighting the key differences, use cases, and benefits of each so that you can ensure that your infrastructure meets its unique reliability and availability requirements.

What is Business Email Compromise (BEC)?

Business Email Compromise (BEC) is a type of cyberattack where attackers use email to exploit businesses by deceiving employees into transferring money or sensitive information. These attacks often involve impersonation of company executives or trusted business contacts to trick recipients into performing specific actions. As businesses become more reliant on digital communication, the threat of BEC grows, making it essential for organizations to recognize and mitigate these risks effectively.

What's new from Apple's WWDC24

Apple made plenty of announcements last week at their Worldwide Developer Conference; from Apple Intelligence, to the upcoming iOS 18, iPadOS 18 and macOS Sequoia, and many more targeting end users and the Apple developer community. While we can’t recap every single feature and update, I wanted to highlight a handful of them that will affect any administrators using Apple devices in their environment, as well as the tools used to manage those devices.

Bring Us Your Mobile! NinjaOne MDM Supports Android, iOS and iPadOS Devices

Thanks to the tireless dedication of our product team, a super-active beta program, and hundreds of early adopters seeking a better way to do mobile, we are thrilled to officially introduce NinjaOne Mobile Device Management (MDM) – an extension to our No. 1-rated endpoint management platform!

Mobile Device Management: 6 Features You Need in your MDM Solution

Mobile devices are the norm in the workplace today, allowing your teams around the world to communicate and work together more efficiently. Traditional network boundaries shifted significantly during the global pandemic and organizations had to quickly learn to support a newly remote workforce. With the remote and hybrid work model the new normal, IT departments now support more mobile devices than ever.

Complete Guide: Understanding and Preventing DCSync Attacks

Gaining insights into DCSync attacks is key to fortifying your Active Directory (AD) against these sophisticated threats. By exploiting legitimate AD replication protocols, attackers can discreetly extract sensitive information, such as password hashes and Kerberos tickets. Recognizing these attack vectors enables you to implement more effective monitoring and auditing tools, enhancing your overall security posture.

What Are the HIPAA Data Backup Requirements?

The Health Insurance Portability and Accountability Act (HIPAA) enforces how you must retain and protect sensitive user data in a healthcare setting. Compliance is mandatory, and knowingly breaching HIPAA rules (including disclosing health information of individuals) comes with hefty fines and even jail time. It is important that your data practices and infrastructure and the third parties you trust to store and protect sensitive information, recognize and comply with HIPAA regulations.

What Is Full Stack Observability & Why Is It Important?

Full stack observability is not merely about collecting data but about providing actionable insights. It empowers you to see beyond isolated metrics and logs, facilitating a deeper understanding of the interconnected nature of modern software systems. By implementing full stack observability, you can maintain operational integrity, swiftly address performance issues, and ensure a seamless user experience.

Feeling Pressure to Improve Security Posture? Start with Your Endpoints!

Many organizations continue to invest heavily in advanced cybersecurity solutions in efforts to better defend against attacks that are not only increasing in frequency but also becoming more complex and difficult to detect. However, the importance of good cyber hygiene, starting with the endpoint, is often overlooked. This is alarming considering Verizon’s 2024 Data Breach Investigations Report found that 80% of breaches involved basic hygiene failures.

What is a Checksum & How to Use One

Checksums play an important role in various fields, from data integrity verification to cyber security. They are essential tools for ensuring the accuracy and security of data transmission and storage. While exploring what a checksum is, you will discover its significant role in cyber security, how to use checksums effectively, and best practices for their implementation.

Workflow Management for IT Departments: Enhancing Efficiency Through Automation

Workflow management lets IT departments streamline processes, enhance efficiency, and reduce errors. By automating repetitive IT tasks, your IT team can focus on more strategic activities, ultimately driving innovation and improving service delivery. Here’s how to get started.

Alternate Data Streams: A Complete Overview

Understanding Alternate Data Streams (ADS) within file systems, particularly within the NTFS framework on Windows operating systems, is crucial for IT security professionals, software developers, digital forensic analysts, and anyone interested in data security. This article aims to provide a comprehensive overview of ADS, exploring their technical aspects, legitimate uses, and security implications.

NinjaOne Ticketing Speedrun - Master Your Ticketing System in Under an Hour

Configuring a ticketing system can be a daunting task. Simplify the process by joining our exclusive NinjaOne Speedrun webinar! Our Field CTO, Jeff Hunter is on the clock to lead you through the essentials of configuring your NinjaOne ticketing system from scratch. Whether you're a beginner or looking to refine your setup, this webinar is designed to get you up and running in under an hour. Learn to transform a blank slate into a fully functional NinjaOne ticketing instance in under an hour. The clock is ticking!