Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Asset Management, Device Management and related technologies.

What Is a BadUSB? Understand the Threat and How to Prevent It

Lurking beneath the convenience and everyday nature of USB devices is a sophisticated cybersecurity threat known as BadUSB. BadUSB is a type of attack that leverages the reprogrammable firmware in USB devices (e.g., flash drives, keyboards, charging cables) to carry out malicious actions. Unlike traditional malware, which lives in the file system and can often be detected by antivirus tools, BadUSB lives in the firmware layer.

Essential Monthly Developer Updates: Security and Software Improvements

Monthly developer updates focus on critical areas like Azure vulnerabilities and Visual Studio updates. Attention is needed for the Azure Monitor agent and service fabric, especially regarding auto-update settings. With Windows 10 nearing its end of life, organizations should consider ESU support. Adobe updates address vulnerabilities in After Effects, InCopy, and Illustrator. Windows updates for versions 10 and 11 tackle various vulnerabilities, while SQL Server and SharePoint server updates are essential for security.

Your Windows 11 Migration Is Looming - but There's a Bot for That

I recently spoke with a CIO who had committed a large amount of IT resources to manually migrating computers from Windows 10 to Windows 11. The process required months of planning, device assessments, compatibility testing and hands-on coordination to avoid disruptions to day-to-day business operations. While their dedication ensured their rollout was on track for the looming Windows 11 end-of-support date, it highlighted the strain such projects place on internal teams.

Cleaning House: Tackle Your Technical Debt

Whether it's a situation that you've stumbled into or it's been building up over time due to budget constraints or limited time, technical debt plagues many an organization. And unfortunately, just like real debt, it's hard to clear once it's begun to pile up. In this stream, we'll be talking to a few IT leaders to discuss what technical debt looks like for them, what problems it can cause over time, and how you can start to chip away at the mountain.

Why Excel Falls Short for Inventory Management - And What to Use Instead

Inventory management is a critical function for any organization. Many small businesses begin with Excel inventory management because it’s accessible and low-cost. While inventory management in Excel may work in the short term, it quickly becomes inefficient as your operations grow.

Three Methods for Finding Your Windows PC's Serial Number

It’s safe to say that most of us probably don’t have our Windows PC’s serial number memorized by heart–which becomes tricky once you need it during a repair or part replacement. This is why we at Ninjaone have created this video guiding you through how to find the serial number of your PC using Command Prompt, PowerShell, and BIOS. Chapters: Introduction 00:01 Command Prompt Method 00:22 PowerShell Method 00:50 BIOS Method 01:17.

How to Kill a Process in Windows: 4 Methods

Is your device lagging or unresponsive? One of the most effective ways to solve these issues is to force kill resource-heavy tasks to free up CPU and memory on your Windows system. In this video, you'll learn how to kill a process in Windows to address performance issues. We'll show you four different methods to force kill processes. Chapters: Introduction 00:01 Task Manager Method 00:37 TaskKill Method 01:10 PowerShell Method 02:04 Create Desktop Shortcuts 03:02 Third-Party Tools03:58Recap 04:12.

How to Start Safe Mode with Windows Command Prompt

Discover the cause behind crashes and system issues by using Safe Mode to access your Windows system without interference from third-party applications or system processes. Watch this video to learn how to start Safe Mode with Windows Command Prompt and find out what you can do in Safe Mode to resolve issues. CHAPTERS: Introduction 00:01 Advanced Startup Options 00:31 MSConfig 01:01 Alternative Methods 01:41 Troubleshooting 02:17 Conclusion 03:24.