Managing admin consent requests in ITSM tools 16 January 2025 Review new applications in seconds: how ITSM tooling can help reduce the administrative burden of admin consent requests, improving privacy…
What is shadow IT? Answers to 5 frequently asked questions 21 December 2024 What is shadow IT? Read the answers to 5 frequently asked questions about shadow IT and find out how to…
The benefits of incident response plans in cybersecurity 17 October 2024 Discover the benefits of an incident response plan and how it can enhance your organization's security and resilience. Learn more…
Security issues: how ITSM can reduce cyber threats 10 October 2024 Discover essential strategies to enhance ITSM security management in our latest blog post. Stay informed and protect your organization effectively....
Bridging the gap: how ITSM and cybersecurity work together 03 October 2024 Learn how ITSM and cybersecurity go hand in hand. Explore the essential intersection between IT service management and security in…
Getting NIS 2 ready: how ITSM tools can facilitate compliance 26 September 2024 Discover how NIS 2 compliance ITSM tools can simplify your organization's adherence to NIS 2 requirements in our insightful blog…
The 5 biggest BYOD cybersecurity risks 25 August 2022 BYOD (bring your own device) is on the rise, but for IT this can easily turn into a cybersecurity nightmare.…
6 ways to boost your organization’s IT security 04 August 2022 Keeping breaches at bay is a major priority for IT departments. Here are our 6 top tips for strengthening your…
The cybersecurity risks of remote working 05 July 2022 Hybrid working has changed the face of IT security. Read this blog to learn more about the cybersecurity risks of…
How to maintain security when employees work remotely 23 April 2020 Struggling to balance security and employee experience? Check out our comprehensive guide on how to maintain security when employees work…
Halloween: 5 IT security nightmares to keep you up all night 31 October 2019 It’s cyber security month! And Halloween. Read the 5 IT security nightmares and reduce the risk of them coming true....