Bomgar Blog

New Bomgar Connect Offers Fast, Reliable Remote Support for SMBs

This week we are extremely excited to announce our newest remote support solution, Bomgar Connect, a SaaS-based solution that enables organizations to quickly connect to and support end-users, customers and systems in any location. Designed specifically for organizations with less complex support needs, Bomgar Connect is an easy-to-use, low-cost solution that is built on our enterprise-grade remote support technology. Continue Reading

What You Didn’t Think You Would Use Bomgar For

One of our favorite parts about tradeshows is getting to see many of our customers in person. Often times we get to hear some pretty neat success stories when they stop by, but every once in a while we get to hear some silly stories about how they have used Bomgar in their everyday lives outside of work. We wanted to share a few of our favorites. Continue Reading

Is Your IT Help Desk Helping Hackers?

The IT help desk. Others in the company may consider it the bastion of IT support, but the IT help desk may not always be a beacon of sound IT practices. Given the access and credentials that IT professionals typically need to assist with technical issues, they make a perfect target for hackers seeking to steal company information. Fortunately, there are steps organizations can take to prevent their help desk from becoming a one-way ticket to a major data breach. Continue Reading

Privilege Misuse a Highlight in the 2016 Verizon DBIR

Verizon’s annual Data Breach Investigations Report for 2016 is now out, and it highlights some dangerous trends facing today’s businesses and governments. With more than 100,000 incidents and 2,000 breaches analyzed, Verizon has captured a holistic view of the state of global cybersecurity. The 2016 report highlights long-standing vulnerabilities around privileged access misuse and exploitation. Top industries affected include healthcare, finance, and the public sector – three sectors with extremely sensitive and lucrative data. Continue Reading

Poor Security Practices Just Don’t Fly

Happy Password Day from sunny Florida! You know, I love living in the Tampa area for a lot of reasons, among them getting to regularly use one of the best airports in the U.S.: Tampa International Airport (TIA). Unfortunately for the folks who run TIA, they had a spot of trouble that was reported this week by the Tampa Tribune and others. Like a lot of places these days, TIA experienced a security breach. Unlike a lot of places--because it's an international airport--TIA has to do a lot of explaining. Continue Reading

Bomgar Improves Efficiency and Security for More Than 480 IT Service Providers

As today’s technology landscape continues to change, the demand for technology support continues to increase. Users are using a wide variety of devices on a daily basis, thus needing access to support 24/7. In the last year, Bomgar has added more than 50 IT service providers and outsourcers as customers, bringing the grand total to 482 organizations using Bomgar’s secure remote support solution to provide superior tech support. Whether supporting businesses or individual consumers, Bomgar has enabled these service providers such as Intility and CSC to enhance their customer support experience and increase technician productivity. Continue Reading

Data Breach Trends Drive Modifications to Latest PCI Security Standards

With the announcement of PCI DSS 3.2 from the Payment Card Industry Security Standards Council hot off the press, it’s important to understand the ramifications of the new requirements. Bomgar provides all system administrators who need access to a PCI environment a secure method for connectivity enforced by multi-factor through our Privileged Access Management and Remote Support solutions. Continue Reading

Reap the Rewards of Chat Support in 10 Steps

Both cost effective and user-friendly, chat support is able to reduce handling times and improve customer satisfaction. But without proper planning, incorporating a chat capability into tech support can be a daunting task, even if it’s a necessary one. Continue Reading

The Three Major Security Implications of the IoT

Infosec pros have spent the past decade fighting a rising tide of both more users and more devices connecting to enterprise resources while at the same time trying to decrease the attack surface -- that is, trying to shut down as many points of access as possible. Much of this is usually attempted by first inventorying connections, consolidating network systems and targeted servers, building portals to cut down on remote access, and advanced correlation of security events by a central security element. Continue Reading

Prevent Tax Fraud with Bomgar Privileged Access Management

Monday, April 18th, 2016. Zero hour. Tax Day. Today you’re popping a champagne cork in celebration of a well-deserved rebate or muttering to yourself about the injustices of the system in between sips of Pabst Blue Ribbon. Either way, if this is you, your taxes were filed successfully and the doomsday clock to Uncle Sam’s next pay day resets to 365. Continue Reading