Top 5 Steps For SMB Endpoint Security Success
5 steps small to mid-sized businesses (SMBs) can do to stop the flood of endpoint security issues, while focusing on the day-to-day of their business.
Read MoreWhat Are Event Logs and Why Do They Matter?
Analyzing logs helps with the technical support of devices, users, applications, and more. Learn more about why event logs are so important.
Read MoreBlumira Agent: SMB Endpoint Security
Blumira Agent equips small teams with a centralized view of an organization’s remote Windows devices that are sending logs to Blumira’s platform.
Read MoreNew Feature Release: Blumira Agent – Endpoint Security For SMBs
Blumira Agent provides support for Windows devices located anywhere – all without requiring additional infrastructure. Learn more in this blog post.
Read MoreHow To Navigate Microsoft 365 Audit Logs
Admins can search the unified audit log in Microsoft 365 to detect potentially malicious activity. Here are a few ways to do it.
Read MoreHow To Manage Windows Firewall with GPOs
Managing Windows Firewall with Group Policy is easier and faster. Here’s a step-by-step tutorial of how to configure Windows Firewall with GPOs.
Read MoreTop 18 Tips to Secure SSH on Linux
Linux admins cannot rely on the default configuration of SSH being inherently secure. Learn best practices on how to secure SSH in Linux.
Read MoreHow To Use Nmap To Scan For Open Ports
Scanning with Nmap is an easy way to peek into your network. Learn how to use Nmap to scan all ports and find vulnerabilities in your environment.
Read MoreBlumira Earns G2’s Best Support Award For The 10th Consecutive Time
Explore Blumira's award-winning cybersecurity solutions in the G2 Winter 2023 Awards. Discover why users love our security platform.
Read MoreA Blue Teamer’s Bug Report
Amanda Berlin found a bug within Google Workspace with potentially malicious outcomes surrounding attribution.
Read More