Cyber Security: WiFi Security

| | Comments are off for this post.

Nowadays, many organisations want their employees to be mobile and be able to connect from everywhere. It is an excellent approach, however…. most of the network intrusions and fishing occur through mobile and wi-fi devices. Credentials can easily be phished by cyber-criminals and used to access your confidential data.

Here is one experiment that shows how we make life easy for cyber-criminals:

Awareness and proper solutions ensure a secure environment, confidentiality and integrity of your data.

Contact us today, to learn how iRangers delivers appropriate solutions for new business demands.

One Of The Most Important Cyber Security Facts: Staff Security Awareness

| | Comments are off for this post.


One Of The Most Important Cyber Security Facts: Staff Security Awareness

Information is the most valuable asset that organisations own. Information leakage caused by accident or due to a lack of awareness occur all the time and can cause huge damage to an organisation and even people lives!

Although there is more awareness recently, unfortunately, in many projects we get involved we still see a lot of situations shown in this video. 🙁
(more…)

ns-cli

How Do I – Citrix NetScaler CLI

| | Comments are off for this post.

“How Do I” Series With this blog post, we are opening a series of “How Do I” posts about all sorts of technical tips and tricks that will help you co configure, support, troubleshoot and monitor various systems. The idea behind the “How Do I” series is to give you…

Continue Reading
Puzzle. 3D modeling and rendering

Stale Citrix XenApp/XenDesktop Sessions

| | Comments are off for this post.

Very often in our own and our clients’ XenApp and XenDesktop environments we face an issue where some sessions mysteriously stay connected with no owner when users disconnect. These phantom or ghost sessions cause lots of headache to IT support teams. To briefly describe the issue: (more…)

Continue Reading

Cloud Zootopia – Sloth and the Hare

| | Comments are off for this post.


 

More and more organisations are moving to Cloud. Some companies decide to go to Amazon AWS, some to Google cloud and others to Microsoft Azure & Office 365.

During many cloud projects, we were involved with, we’ve seen a very common pattern – businesses have hard time realizing that Cloud evolves with a speed of lighting! It means cloud vendors do A LOT of changes on a regular basis (just think of Microsoft’s updates cycles) and business needs to keep up with those changes. In many situations, business is forced to quickly make changes in their architecture, change business processes, install some updated versions of the products and so on….

I would say, that if you want to succeed in your Cloud journey, it’s better to be the Hare (or hire iRangers :)) than the Sloth….at least in this case!

1-citrix

New Citrix Handbook and Best Practices

| | Comments are off for this post.

Some of our clients ask how iRangers architects approach the solution design initiatives and what our design recommendations are based on. Of course, most of our design recommendations come from experience and all of them are based on industry leading practices. Most of the time, to structure the approach and…

Continue Reading

Critical Vulnerability in Adobe Flash

| | Comments are off for this post.

A critical vulnerability has recently been identified by Adobe in their Flash Player version 23.0.0.185 or earlier. The CVE-2016-7855 vulnerability allows hackers to run malicious code on the affected computer using a Flash file. The existing exploit can potentially grant the hacker the full control over the affected system. Flash…

Continue Reading