Bomgar Blog

by Sophie Brown published

License Pool: Bomgar Tips and Tricks

Check out our latest install of the Tips and Tricks series. This month, Joel Patrick, takes a look at the new License Pool feature that came out in the 15.1 Remote Support Release. The License Pool capability provides more flexible reservation functionality and allows admins to better manage their Bomgar investment.

Continue Reading
by Elizabeth Hulsey published

Bomgar Launches New Privileged Access Management and Remote Support Solutions

Today Bomgar is excited to introduce new solutions to help you better manage secure access, while also enhancing the performance and productivity of your support and security professionals.

Continue Reading
by Elizabeth Hulsey published

United Telcom Supports Geographically Dispersed Subscriber Base with Bomgar

United Telcom first organized under the name United Telephone Association in 1951 by a group of farmers who wanted telephone service in the rural area surrounding Dodge City when Southwestern Bell indicated no interest in providing service to the area. Growing in service area and offerings for more than 60 years, today the company has approximately 100 employees dedicated to providing a wide range of internet, cable and phone services to subscribers throughout southwestern Kansas. Now using Bomgar, United Telcom efficiently supports approximately 5,000 users in a 250 by 100 mile area in southwestern Kansas.

Continue Reading
by Elizabeth Hulsey published

Spring Cleaning: Privileged Accounts

It’s finally that time of year again. Another Bomgar March Madness is in the books and spring is in the air, but of course with that comes spring-cleaning. For IT execs, that can take on many forms but one area that is often neglected is privileged account access. In BeyondTrust’s latest survey, 47% of respondents reported that users in their organizations possess elevated privileges not necessary for their roles. This represents a massive vulnerability to insider threats as well as unnecessary exposure in the event of lost or stolen credentials. As such, it’s critical that organizations shore up privileged access and as they say, there’s no time like the present.

Continue Reading
by Elizabeth Hulsey published

Payment Security is Still a Struggle

Earlier this month, Verizon published its 2015 PCI Compliance Report, which offers insight into the state of compliance and controls around payment card data security. The number of security incidents continues to be on the rise, indicating that many organizations’ compliance efforts aren’t slowing down attacks.

Continue Reading
by Elizabeth Hulsey published

Unraveling the Unknown Dangers of Desktop Support and Data Breaches

The high profile breaches of Target, Home Depot, Anthem and others have brought the dangers of unsecure remote access to the forefront and left many businesses wondering what can be done. To get to the bottom of the issue, you must start at the beginning and explore the vulnerabilities that those companies fell victim to. The good news is that by learning from their mistakes, you can bring your organization much closer to keeping your name off of the list of victims.

Continue Reading
by Elizabeth Hulsey published

Healthcare Providers, Take Note! Bomgar Shares Security Tips with Physicians Practice

Think hackers are only interested in corporate and financial data? Think again! The value of healthcare records is on the rise and many organizations have lagged in closing the security gap, making them an attractive target for hackers.

Continue Reading
by Sophie Brown published

Bomgar March Madness 2015

For the fourth year in a row we wanted to celebrate the annual dip in productivity that is March Madness by creating a Bomgar March Madness Bracket. It was a great year for Bomgar’s over 700 higher education customers with more than 50% of the NCAA bracket packing orange for their IT needs. For those new to the concept, we run our tournament a little differently.

Continue Reading
by Elizabeth Hulsey published

Government Technology: Are You Safe from the Third-Party Threat?

Much like the private sector, government agencies at all levels are increasingly becoming targets of hackers seeking to obtain sensitive data. Following a series of high-profile government data breaches within the past year, many agencies are expanding their efforts to shore up weak points in their IT networks.

Continue Reading
by Elizabeth Hulsey published

IT Managers: Give Thanks

Today is Employee Appreciation Day—an annual event of the past twenty years for bosses to recognize their workers. While some may do so by bringing in snacks or encouraging people to sign off early, a recent survey from Kronos points to a simpler, and more effective, reward: “thank you.” More than half of the study’s respondents said that receiving thanks from their direct manager gave them a high sense of satisfaction at work.

Continue Reading
Page 3 of 35 pages: 12345 Last