Bomgar Blog

by Elizabeth Hulsey published

Celebrating System Admin Day

IT professionals of all types are part of a community that understands that late night (or early morning) calls for urgent IT fixes are part of the job, and that no task, no matter how small, can go unresolved. A day’s work is almost never the same—you never know whether you’ll be rescuing laptops from malware, getting email back online, or upgrading systems to keep them more efficient and secure.

Continue Reading
by Doug Patel published

How Bomgar can help combat social engineering attacks

Most often organizations use multiple remote support tools to provide support to their end users. While this may seem harmless, it actually creates vulnerabilities conducive to social engineering attacks.

Continue Reading
by Sam Elliott published

Vendor Access and the OPM Breach

With the departure of Katherine Archuleta following the massive breach at the Office of Personnel Management (OPM), many people have been quick to say that a major part of the organization’s problem has been fixed. However, this is certainly not the case. There are many weak links in the security chain that led to the breach, or as we now know, breaches. The real issues are not the fault of any one individual. Rather, they point to the vulnerabilities that arise when security protocols don’t evolve in tandem with the changing nature of enterprise threats.

Continue Reading
by Rachel Smith published

Bomgar and Windows 10 – what you need to know

With the release of the new Windows 10 update less than two weeks away (July 29th), we wanted to let you know what big changes you should expect to see and how Bomgar will work with some of the new features. Many of our Insider Advocates have come up with compatibility and product questions for our development and support team, so we set out to get some answers.

Continue Reading
by Elizabeth Hulsey published

What games best prepared you for life as an IT pro?

It’s summertime and occasionally, our minds can wander thinking about how we grew up so quickly. We reminisce of our childhood and wishing we were back in the exciting days of summer vacation, playing the days and long nights away.

Continue Reading
by Liz Shulof published

Version 3.0 PCI-DSS requirements now in effect

Version 3.0 of the Payment Card Industry Data Security Standard (PCI DSS) includes five best practices that will become requirements effective after June 30. PCI DSS provides a baseline of technical and operational requirements designed to protect cardholder data. While compliance with PCI DSS cannot prevent cyberattacks, implementing these standards can help businesses better identify, react to and execute response plans when breaches occur.

Continue Reading
by Elizabeth Hulsey published

Taylor Swift Takes a Tech Support Call

After Taylor Swift stood up to Apple this week, we thought we’d give her a try at the rough and tumble tech support. It’s summer. We need a break from the grind, so here’s how support call taken by Taylor Swift might go...

Continue Reading
by Kim Richard published

Time to Take another Look at Remote Support

Today’s remote support solutions offer more than just remote control for PCs and are continuing to expand their functional footprint. That’s according to the Technology Services Industry Association’s (TSIA) recent 2015 Remote Support Trends report. The report advises service executives to acquaint themselves with the new features and capabilities being introduced by leading remote support platforms and find ways to leverage the capabilities beyond technical support. Remote support solutions are typically held in high regard by users and consistently deliver one of the highest average satisfaction scores in TSIA’s annual Global Technology Survey.

Continue Reading
by Justin Brock published

Remote Screen Sharing for Android Devices

Remote Android Screen Sharing

Today Bomgar announced the expansion of Remote Screen Sharing for Android to all Android 5.0+ devices. Technicians using Bomgar Remote Support can already remote control Android devices made by Samsung. Now Bomgar enables real-time screen sharing for other manufacturers and device types. In order to screen share with Android, your customer will need to have a device running Android 5.0+ and the Bomgar Android 2.2.6 Customer Client from Google Play.

Continue Reading
by Liz Shulof published

Weak Remote Access and Passwords Most Exploited Vulnerabilities in 2014 Data Breaches

Last week, Trustwave released their 2015 Global Security Report, for which they analyzed more than 570 data compromise investigations across 15 countries, examining data from more than four million network vulnerability scans. The report highlights the most prevalent vulnerabilities and exploits used in attacks, valuable knowledge to have when planning and prioritizing security efforts.

Continue Reading
Page 1 of 35 pages: 123 Last