Blog, Lansweeper Blog
What is Remote Code Execution (RCE)? | Lansweeper
Originally published by Lansweeper. Remote code execution or RCE, also known as arbitrary code execution, is a type of cyberattack. This can affect a person regardless of the location of the device. It allows an attacker to remotely execute malicious code on another person’s computer or device.
Read MoreBlog, Lansweeper Blog
What is a Zero-day Vulnerability? | Lansweeper
Originally published by Lansweeper. A zero-day vulnerability is a flaw in a piece of software that is unknown to the software developer and does not yet have a fix. Hackers and other cybercriminals can exploit these vulnerabilities using hacking techniques and malware to gain access to critical systems and data.
Read MoreBlog, Lansweeper Blog
Lansweeper’s 2022 Spring Launch: ‘Aymon’
Originally published by Lansweeper. Lansweeper’s latest 2022 Spring Launch delivers on the promise of Technology Asset Intelligence, enabling organizations to derive actionable intelligence from every physical, virtual and software asset across the technology estate.
Read MoreBlog, Lansweeper Blog
Y2K22 Exchange Bug Cripples Emails | Lansweeper
Microsoft was undoubtedly the first to surprise everyone in the new year. An issue in Exchange’s antivirus engine is causing email delivery to fail on Exchange 2019 and Exchange 2016 servers. Luckily Microsoft provided mitigation using a script while a patch is in the works.
Read MoreBlog, Lansweeper Blog
Active Scanning: Detailed Asset Data in Seconds | Lansweeper
Active scanning is a scanning method whereby you scan individual endpoints in an IT network for the purpose of retrieving more detailed information. You send packets or queries directly to specific assets rather than passively collecting that data by “catching” it in transit on the network’s traffic.
Read MoreArcusTeam Blog, Lansweeper Blog, Webinar
Live Webinar | Know your Devices Security Posture with Lansweeper & ArcusTeam
Attend this 30 minute webinar and learn how Lansweeper’s industry leading asset management platform coupled with ArcusTeam’s threat detection capabilities provides you with a full lifecycle attack surface management for all of your devices.
Read MoreBlog, Lansweeper Blog
5 Ways Organizations can Reduce IT Costs through ITAM 2.0 | Lansweeper
As organizations adopt new technologies and assets to support digital transformation initiatives, and as technology spending increases, ITAM 2.0 solutions can offer significant and measurable IT cost reductions.
Read MoreBlog, Lansweeper Blog
The Top 6 Worst Tech Nightmares Haunting IT Pros | Lansweeper
Your network faces nightmares from cybercriminals, system errors and more. Time to shine a light on the seven most sinister terrors that haunt sysadmins. Welcome to the tech nightmares.
Read MoreBlog, Lansweeper Blog
The First Step to Making Cloud Computing More Cost-Effective | Lansweeper
Cloud migrations have become increasingly popular among corporations and for obvious reasons. Digital transformation through cloud adoption is top-of-mind for every business, regardless of industry, shape, and size. But moving assets from physical or hybrid hosting servers to a cloud service poses specific strategic and technical challenges for a business.
Read MoreArcusTeam Blog, Blog, Lansweeper Blog
Complete End-to-End Management and Security for Connected Devices | ArcusTeam & Lansweeper
Today’s networks are constantly expanding and evolving with the addition of new connected devices and a multitude of device types. But this increased complexity presents new challenges for managing the devices as well as protecting the organization from the new threats and vulnerabilities introduced by each and every device.
Read MoreBlog, Lansweeper Blog
Is Your Business Ready for Windows 11? | Lansweeper
With Microsoft’s release of Windows 11 just around the corner, IT teams in large enterprises are under pressure to devise a plan of attack. To roll out the new OS, they’ll need a quick and cost-effective Windows 11 readiness check to identify machines that are eligible — and ineligible — for the upgrade.
Read MoreBlog, Lansweeper Blog
How Lansweeper Can Help You Catch Cryptojackers | Lansweeper
Cryptocurrency market size is projected to grow to more than $1 billion by 2026. And while server farms and DIY home cryptocurrency mining is definitely still happening, there are ways of making just as much (if not more) profit without investing in infrastructure. And cybercriminals know it.
Read MoreBlog, Lansweeper Blog
Your CMDB Is a Valuable Tool – but Only If You Can Trust It | Lansweeper
Your CMDB can provide the foundation for IT service management (ITSM) and be a valuable tool for assisting with operations, software asset management, cybersecurity initiatives and compliance audits – but only if it’s complete, accurate and up to date.
Read MoreBlog, Lansweeper Blog
Preventing Malvertising in your Organization | Lansweeper
Advertisements might seem like something that poses no risks to your organization. However, having an ad blocker has more utility in your organization than you might think.
Read MoreBlog, Lansweeper Blog
Diagnose, Prevent and Fix Hardware Failure | Lansweeper
Hardware failures are one of the few unexpected occurrences that can have a major impact on an organization, critical systems being down or users not being able to perform their tasks can cost the business.
Read MoreBlog, Lansweeper Blog
Working from Home: Tips to Secure Your Remote Workforce | Lansweeper
Amid this giant wave of disruption, one thing has unfortunately remained the same: the willingness of cybercriminals to exploit society’s misfortune to obstruct business, deceive users and steal proprietary data.
Read MoreBlog, Lansweeper Blog
How ITAM 2.0 Enables Big Opportunities For IT Cost Optimization | Lansweeper
Covid-19’s unprecedented global economic impact has forced CIOs to find innovative ways to manage and control costs, all while supporting organizational goals for digital transformation.
Read MoreLansweeper Blog, Webinar
Lansweeper | IT Discovery: A Critical First Step in IT Security
Adoption of Cloud, growing complexity of the IT environment, Work from home and more workloads introduce security risks. This requires that IT asset management must evolve beyond a centralized asset inventory and compliance solution.
Read More