Kisha Gulley was once kicked out of a Facebook group for mothers with autistic children after a c...Read More
2021 was a busy year for Kaseya. As the year draws to an end, we’d like to take the time to look back at some of our most sought-after blog posts that kept you entertained and enlightened. From virtualization and third-party patching to CapEx versus OpEx analyses and hybrid work trends, our blogs covered a host of eclectic topics of interest that trended for the greater part of 2021. Here’s a brief recap of our 10 most popular blog posts from the past year.
Hybrid work remains all the rage in this COVID-19 era and has transformed the way businesses function across the globe. What exactly does embracing hybrid work in the new normal entail? What are the benefits of hybrid work and what are some of its drawbacks? Answers to these and many more such questions can be found in our blog post here.
As an integral part of your business’s financial planning, IT budgeting is imperative for tracking and controlling your IT expenses and strategizing ways to optimize and save money wherever possible. This blog post answers some of the most burning questions surrounding IT budgeting such as what is included in a typical IT budget and what are some of the best practices to follow to improve business efficiency, optimize operational costs and boost revenue.
Enterprise mobility management (EMM) is an IT framework for managing and securing mobile devices and business applications employees use in the workplace. Presently, when mobile devices are the preferred tools at work, EMM is becoming a critical IT requirement. Our insightful blog covers important topics such as the evolution of EMM, its standalone features, benefits and ways to implement it. Get all this information and more in our blog post here.
Effective management of service requests is imperative for maintaining team efficiency and ensuring business success. While service request management might be a familiar topic for most, it doesn’t hurt to get a little refresher on what it does for your business. In this concise blog post, we touch on effective service request management steps, the difference between service request management and incident management, its purpose and best practices.
ITIL or Information Technology Infrastructure Library can be described as a library or a repository of volumes that describe a standard framework of best practices for delivering IT services. There are four different versions of ITIL, with ITIL V3 and ITIL 4 the most popular among them. But how is ITIL V3 different from ITIL 4? Want to find out? Read our blog post here.
Given the obvious security lapses and vulnerabilities associated with long-term remote and hybrid work, cybercriminals around the world are having a field day. Software patching is an effective defense against hackers. However, cybercriminals can wreak havoc on your system even before you are able to install patches by leveraging zero-day vulnerabilities. A zero-day vulnerability is a flaw in a network or software that hasn’t been patched or for which a patch isn’t available. The software or device vendor may or may not be aware of this flaw. If that flaw is out in the open, it poses a greater cyberattack risk to organizations that use the software or device. Is there a way to boost your defense against zero-day attacks? Find out in our blog post.
While we’re talking about patch management, let’s not overlook the importance of third-party patching in building a holistic security posture for your business. Third-party patching is the process of deploying patch updates to third-party applications that have been installed on one or more of your endpoints (e.g., servers, desktops, or laptops). Want to know more about why third-party patching is a critical component of IT security? Check out our information-packed blog post here.
While it is impossible to completely rule out the possibility of downtime, IT teams can implement strategies to minimize the risk of business interruptions due to system unavailability. One of the most efficient ways to manage the risk of downtime is high availability (HA), which facilitates maximum potential uptime. So, how do you measure high availability and what are the best practices you must follow to achieve it? Get answers to these questions and many more in our insightful high availability blog post here.
Another popular blog on IT budgeting, this one provides you with a basic understanding of the differences between CapEx and OpEx — the two major types of IT budgeting that are treated very differently as far as accounting and taxation for businesses are concerned. Which of the two makes the most sense for your business? Find out in our blog.
Virtualization technology has its origins in the 1960s, with work that was done at IBM on time-sharing of mainframe computers. Today, it’s standard practice to use virtualization to increase the utilization of the computing resources in the computer. In this most popular blog of 2021, we have discussed all the different types of virtualization technologies and highlighted the major distinguishing factors between Hyper-V and VMware. Check it out here.
Wrapping up 2021, we’d like to thank you all for your consistent love and support. Thank you for placing your trust in us and our powerful uRMM/UEM solution, Kaseya VSA. It’s been a long yet exciting year, but we’re excited to roll into 2022.
Until then, leverage the powerful capabilities of Kaseya VSA and manage, monitor and secure your endpoints in the “new normal” from a single console. Subscribe to our blog for regular insights on the latest industry trends and get valuable knowhow from our team of thought leaders.
The post Kaseya’s Best Blogs of 2021 appeared first on Kaseya.
*** This is a Security Bloggers Network syndicated blog from Blog – Kaseya authored by Kaseya. Read the original post at: https://www.kaseya.com/blog/2022/01/04/kaseyas-best-blogs-of-2021/