by Bryan Hood published

Attack from the Inside or Out: Small Security Steps can Stop Big Breaches

Today's news is again rife with data breaches; namely at UPS (possibly linked to the Backoff malware, which my colleague blogged about here), and Community Health Systems (which may be linked to the Heartbleed flaw). A continuing theme across these breaches is that a relatively small, seemingly mundane action such as requiring two-factor authentication for remote access or applying a security update could have stopped attackers.

Continue Reading
by Elizabeth Hulsey published

Bomgar Care Network Volunteers at Abba House

Friday, the Bomgar Care Network extended their helping hands to the Abba House thrift store in Dawsonville, Georgia. About 30 Bomgar employees based in the Atlanta area spent an afternoon sorting through donations and organizing and cleaning the store. From moving furniture and color-coding clothes, to dusting and putting books on shelves, the orange-clad Bomgar team served in whatever capacity needed for the day. In addition, Bomgar raised $1,725 to donate to the organization, which will cover just over 10% of their operational costs/scholarships for 3 months.

Continue Reading
by Boatner Blankenstein published

Backoff Malware – Time to Step up Remote Access Security

Another day, another security breach. Today, it’s a number of breaches that may or may not tie together, but all seem to have one thing in common: poor remote access security. Most notably, the US Department of Homeland Security has issued an advisory regarding the “Backoff Point-of-Sale Malware,” which has been associated with several PoS data breach investigations.

Continue Reading
by Liz Richardson published

Improving ITSM Metrics with Remote Support

Remote support is key when it comes to fast incident resolution in a multi-channel contact center. And improving time-to-resolution is at the heart of so many ITSM metrics. What types of metrics can you capture using remote support technologies, and how do you analyze those metrics?

Continue Reading
by Liz Shulof published

Ryan Gosling Takes a Tech Support Call

It’s Friday. And summer. We all need a break. So this: A tech support call with Ryan Gosling’s character from The Notebook. Enjoy.

Continue Reading
by Joel Patrick published

Staying Connected with Bomgar Using Extended Availability

Staying Connected with Bomgar Using Extended Availability

Earlier this year, we introduced you to the concept of Staying Connected with Bomgar Extended Availability. We have taken it one step further with a tips and tricks video highlighting this feature. Often overlooked, this video will help show the value that this feature can provide to your tech support team!

Continue Reading
by Liz Shulof published

Botnet Targets RDP to Compromise POS Systems

Earlier this week, security researchers uncovered a global cybercriminal operation that has compromised thousands of computers, which are actively trying to break into point-of-sale (POS) systems using brute-force techniques to guess remote administration credentials.

Continue Reading
by Jeremy Curley published

How Remote Support can Reduce Volume for the Service Center

Now more than ever, IT organizations need tools and processes that can help extend support while also reducing costs.

Continue Reading
by Liz Richardson published

Top 12 Pieces of Sage Advice from One IT Pro to the Next

Thinking of becoming an IT professional? Just getting your feet wet in the world of customer support? That’s great! IT pros are in demand and the future is looking bright for the technically savvy. But a tech support career is not all butterflies and rainbows. There’s a lot of hard work, long hours and frustration ahead, and chances are you could use a little advice along the way. So, whether you’ve just landed your first service desk job or are the go-to techie for your co-workers, friends, family and boss, here are some words of wisdom and encouragement.

Continue Reading
by Bryan Hood published

Battling Bruteforce RDP Attacks

The team here at Bomgar asked ourselves, “What if you could easily access RDP-enabled machines both locally and remotely without complex firewall configurations or VPNs while keeping your network secure?” Turns out you can!

Continue Reading
Page 1 of 30 pages: 1 2 3 Last