Five worthy reads: Preparing an incident response plan for the pandemic and beyond

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. With the rising concern over cyberattacks in the distributed workforce, this week we explore the concept of cybersecurity incident response during a pandemic.


Uptime monitoring: A boon for your business

A highly functional IT network is the basis of any successful modern business, and for effective operations, organizations must monitor the health and availability of all their IT infrastructure components and ensure they’re up and running 24×7. Uptime is the duration during which a network component is reachable and capable of operating efficiently. Typical networks use ICMP or TCP to communicate with devices and identify idle or inactive ones.


10 network tools every IT admin needs

Remember when native commands like ping and ipconfig were adequate for network inspection? With networks becoming more dynamic, these generic tools don’t seem to make the cut anymore. IT admins are in a constant quest for ad hoc network tools and utilities that could aid specific network management needs. Using individual network diagnostic tools, on the other hand, requires constant tab switching, and comparing data pulled by independent network tools to pinpoint your network issue.


6 top risk factors to triage vulnerabilities effectively

Common Vulnerability Scoring System (CVSS) scores have been viewed as the de facto measure to prioritize vulnerabilities. Vulnerabilities are assigned CVSS scores ranging from one to 10, with 10 being the most severe. However, they were never intended as a means of risk prioritization. If you’ve relied on CVSS scores alone to safeguard your organization, here’s why you’re probably using them incorrectly.


Dealing with data glut: Why ROT data is an issue, and how to manage it

As file storage grows rapidly year after year, new challenges arise around keeping data safe and maintaining control over data storage systems. Who owns which files? Whose files take up what volume of enterprise storage? Which files have become obsolete? How many copies of a file exist, and where? Are there any stale files that contain sensitive data? These questions require up-to-date answers to ensure that business, compliance, and data security needs are easily and effectively met.


Domain controller patch alert! Vulnerability grants domain admin access in 10 seconds

A critical Active Directory vulnerability (CVE-2020-1472) has been making headlines for being the most notorious elevation of privilege bug because it can affect all computers and domain controllers in an organization. This high-risk vulnerability, dubbed Zerologon, gives threat actors easy, instant access to domain controllers without requiring any additional privileges. This attack does not even require a user to be authenticated; the user just needs to be connected to the internal network.

Configuration management database (CMDB) in ServiceDesk Plus

Learn how the Configuration Management Database (CMDB) works in ServiceDesk Plus, how to set up your own CMDB, and how it helps IT teams manage their IT infrastructure better. ServiceDesk Plus is an IT service management (#ITSM) software that helps organizations streamline their ticketing, and manage their IT efficiently, ensuring there's minimal downtime and top notch IT service delivery.  

ManageEngine Positioned in the 2020 Gartner Magic Quadrant for IT Service Management Tools

ServiceDesk Plus, ManageEngine’s flagship IT service management (ITSM) solution, has been named a Niche Player in this year’s Gartner Magic Quadrant for IT Service Management Tools. The Magic Quadrant offers insights for organizations shopping for an ITSM tool for their business needs. The research names some vendors based on strict inclusion criteria that includes vision, capability, size of operations, number of large customers, and more.