PolicyPak Blog

Top 2019 IT Predictions for Security and Management

When I sat down to consider my 2019 IT predictions, it will be no surprise that I started with malware and ended with the cloud. They cover multiple areas of enterprise technology, with an emphasis on security and management. 2019 IT Predictions #1: Cryptomining Malware Continues Cryptocurrency was a major topic in 2018 on a number… [Read More]

Think Your Native MDM Solution is Enough? Think Again

You don’t use just one security solution for your mobile devices, so why would you “go at it alone” with just your Mobile Device Management (MDM) solution? MDM solutions are great, but the management coverage they provide is minimal when compared to the management coverage and security you’ll find with on-premise desktops. MDM alone simply… [Read More]

Citrix WEM and PolicyPak: Better Together or Apart?

Time and again PolicyPak is lauded for making life easier for Citrix admins. However, from time to time, we are compared to a product that Citrix sells called Workspace Environment Manager (WEM). So does PolicyPak compete with or complement Citrix WEM? To sort out how WEM fits into our customers’ Citrix plans and where PolicyPak… [Read More]

Google and Windows — How sweet it is

Since it’s release, Google G Suite has seen steady adoption by small and medium-sized companies. Traditionally conservative enterprises have been slower to transition, but that is changing, as market leaders like Colgate-Palmolive Co and Verizon Communications Inc recently deployed G Suite to their employees. In fact, Google now touts more than 3 million enterprise subscribers,… [Read More]

Recent Poll Shows Continued and Expansive Use of Group Policy

Remember when they said people wouldn’t go to live concerts anymore thanks to the popularity of music videos? There weren’t supposed to be real estate agents anymore thanks to Zillow and there wasn’t supposed to be investment firms thanks to E*Trade. There also wasn’t supposed to be Group Policy thanks to the cloud and MDM,… [Read More]

Ransomware is Once Again the Method of Preference for Cybercriminals

In 2016 the FBI proclaimed ransomware a billion-dollar industry. Ransomware dominated headlines around the world as companies, healthcare centers and governments found themselves combating the digital plague that encrypted data and brought down networks. According to the Verizon 2017 Data Breach Investigation Report, one in three malware attacks were ransomware related in 2016. The onslaught… [Read More]

The Principle of Enforcing Least Privilege (Part 2)

In Part 1 of this blog series, we introduced the Principle of Least Privilege (POLP) and how it is similar to any other set of standard operating procedures that businesses adopt and utilize every day. The PoLP was developed more than 30 years ago by the US Department of Defense and required that each subject… [Read More]

The Principle of Enforcing Least Privilege (Part 1)

It seems that as a society, we always want more. More money, more prestige, more bandwidth, more memory, etc. Often times however, less is more. Oscar Wilde said, “Everything in moderation, including moderation.” When applied to our personal lives, moderation helps us achieve a healthy balance between work and leisure, alone time and socialization. This… [Read More]