Top 3 Information Security Risks to Know About in 2019
Information Security (InfoSec) is the only thing that stands between your information and data catastrophes. Most attacks nowadays target data due to the increasing importance it has on the survival of...
View ArticleWhat Is EDR and Why Do You Need It?
In today’s volatile technology landscape, threat actors use poorly-secured endpoints as a backdoor into the network. These attackers take advantage of the fact that most endpoints are operated and...
View ArticleUsing Devolutions Web Login to Automatically Log Into Your Favorite Websites
Although a recent study suggests that the human brain has the capacity to store the entire Internet, personally, I have my doubts. I can barely remember my own phone number sometimes (how often do I...
View ArticleAugust Poll Results: What’s Your Favorite IT Hack?
Luke Skywalker has The Force. Spiderman has Spidey Sense. Wolverine has Primal Instincts. And IT Pros? Well, they too have something that makes them unique and amazing: IT Hacks!Last month, we asked...
View ArticleSeptember Poll: What’s the Most Realistic-Looking Cyber Scam You’ve Ever Seen?
Some cyber scams are easy to spot — like the ones that end up in your SPAM folder and claim to be from “PayePall”, or from yet another fleeing ambassador (those guys sure have a lot of money stashed...
View ArticleThe Problems with Browser's Password Manager and How To Turn It Off
Do you know how some ideas seem good in theory, but are bad in practice? For example, many of us have experienced the regret of eating too much pizza, drinking too much beer, or binge watching too many...
View ArticleNew Employee Spotlight: Jonathan Trépanier, Software Developer
Today it’s my pleasure to introduce you to a member of our Software Development team: Jonathan Trépanier! He finished his internship and is now fully member of our beautiful team since.I recently had...
View ArticleThe Enemy Within: 72% of IT Pros Admit They’re Vulnerable to Insider Threats
The most chilling horror movies are never about threats that strike from beyond. They’re about dangers that lurk within — in the basement, the attic, or the TV (“they’re heeeeeeeeere”). Well, IT pros...
View ArticleThe Devolutions Time Capsule
At Devolutions, we like having a positive impact. That’s why delivering a “wow factor” is one of our core values. It’s also a big part of the ideas we conceive, the products we develop, and the service...
View ArticleBack to Basics: Using Vaults in Remote Desktop Manager
It’s back to school time, and those beautiful lazy summer days are already a thing of the past. Instead of waking up to the sounds of kids watching cartoons on TV, parents are dealing with stressful...
View ArticleNew Employee Spotlight: Laurence Cadieux, Marketing Coordinator
First of all: if you’re wondering why I’m introducing you to someone you may have encountered on our blog over the last few months, it’s because Laurence is a graduate of our very successful internship...
View ArticleTop 6 Features SMBs Should Look for in a Privileged Access Management Solution
Most Privileged Access Management (PAM) solutions on the market today are designed for large enterprises. While offering a lot of features and much flexibility, they aren’t suited to SMBs because of...
View ArticleHow to Configure Devolutions Web Login in Microsoft Edge
Have you ever wanted to switch from Chrome to Microsoft Edge, but couldn't because Devolutions Web Login wasn't available on Edge? Well, good news everyone! You can now add Chrome extensions to...
View ArticleRemote Desktop Manager Security Upgrade: Application Lock
Hello, fellow Remote Desktop Manager users! This is Mathieu Morissette from the Security Team here at Devolutions. I’ve finally climbed out of our secret underground bunker located at an undisclosed...
View Article5 IT-Related Podcasts That We Love
I’m going to start by telling you that I’m a BIG fan of podcasts. I think they’re a great way to learn about all kinds of new information while you’re in the car, walking your dog, working out at the...
View Article[Customer Story] IT Pro Francois Fournier Trusts Remote Desktop Manager to...
“RDM is the best solution I’ve found on the market, and I’ve never come across anything else that can do what RDM does. Getting it is a no brainer, and one of the best decisions I’ve ever made in my...
View Article[UPDATE] Wayk Now Session Recording Is Here!
You know that feeling when you have some GREAT news — like you just got a promotion at work or bought a new car, and you can’t wait to tell your friends? Well, my dear Devolutions friends, I have some...
View ArticleNew Employee Spotlight: Christine Breault, Technical Writer
Whether they are crafting instruction manuals, how-to guides, process flowcharts — and the list goes on — great technical writers make the difference between understanding critical and complex...
View ArticleSeptember Poll Results: What’s the Most Realistic-Looking Cyber Scam You’ve...
A new survey by cybersecurity firm Proofpoint has found that a whopping 99% of email attacks rely on victims clicking links. However, negligent end users aren’t always to blame (or at least they’re not...
View Article