IT Automation – 6 Technologies for Business Transformation

IT automation is transforming business. IT teams in small and midsize businesses are struggling with budget constraints and skill shortage. As a result, they are constantly overloaded with tasks as the demand for IT…

Cybersecurity Is a Top Priority – What to Do About It?

Cybersecurity affects the everyday lives of most IT practitioners and IT leaders worldwide, with more than 50 percent of them citing “Improving IT Security” as a top priority in 2021…

Congratulations to the Winners Who Escaped the Dreaded Haunted House of IT

Although the Haunted House of IT had some extremely dangerous threats lurking about, many of our brave visitors were able to avoid danger by finding the right weapons to protect…

The National Vulnerability Database (NVD) Explained

In our previous blog – Patch Tuesday: October 2020, we briefly discussed Common Vulnerabilities and Exposures (CVE) and how software vulnerabilities are catalogued in the National Vulnerability Database (NVD). In this blog, lets…

IT Security: Profitability in a Service No One Wants to Use

No one likes paying for things they hope they will never use. Whether it’s car insurance or fire alarms or life vests, our objective is to let those items collect…

2020 IT Operations Survey Results – Highlights and Key Takeaways

Through our latest 2020 IT Operations Survey Results Reports – Strategic Priorities for IT Leaders and Technical Priorities for IT Practitioners — both of which were compiled by surveying over…

Patch Tuesday: October 2020 Updates

Any individual that has spent time on a personal computer knows what an update or patch is. A patch is a set of changes or updates done to a computer…

Patch Tuesday: October 2020 | Kaseya

Any individual that has spent time on a personal computer knows what an update or patch is. A patch is a set of changes or updates done to a computer…

Server Uptime Monitoring for Successful IT Operations

According to a recent ITIC report, the cost of one minute of per server downtime ranges from $1,670 per server, per minute for an hourly outage cost of $100,000, to…

Why Ransoms Are Soaring | Kaseya

Attack Severity When Cryptolocker arrived in 2012, it brought a great deal of fear and panic in its wake. This particularly malicious type of malware affected and encrypted data across…