![bcmonitorlogo hz center BetterCloud Monitor](https://bettercloud.b-cdn.net/wp-content/uploads/2021/07/bcmonitorlogo-hz-center.png)
Empowering, educating, celebrating, and delighting the modern IT professional.
Featured article
Webinar recap: Turning SaaS sprawl into strategic savings
Learn how to combat rising software costs and tame SaaS sprawl in this IT Brew webinar recap. Discover how the experts identify and eliminate redundant tools.
A Top G Suite Expert Shares His 31 Best Modern Security Tips
If you ever wanted to find a treasure trove of excellent security tips — written by a top Google expert in a lively, easy-to-understand way — then look no more. Kevin A. McGrail is a cybersecurity and privacy expert who is also ranked as the #1 contributor in the world on Google’s official G Suite platform, Google Cloud Connect. In this post, he shares 31 recommendations and best practices related to passwords, email security, and more. While some of these tips are specific to G Suite, many are broader ones that can help secure any system.
Read moreAnd the Winning MonitorT-Shirt Design Is…
If you read our newsletter last week, you saw that we held a contest just for BetterCloud Monitor readers. In the quest to make our first ever Monitor T-shirts, we designed four tongue-in-cheek tees (all IT-themed), and we let readers vote for their favorite one. We said that whichever design won, we’d print. And the winner is….
Read moreCalifornia's New Data Privacy Law: A Mini GDPR? What IT Needs to Know
On June 28, 2018, California adopted what is considered the strictest general privacy and data security law in the country. Called the California Consumer Privacy Act (CCPA), it will become effective on January 1, 2020. It’s been called a mini GDPR, but there are differences. Here’s how you can start preparing.
Read more5 Takeaways from “Securing G Suite and Beyond: Tales from the Trenches” (Google Cloud Next '18)
Well, Google Cloud Next ‘18 is a wrap! If you missed it last week, here are some highlights from a panel called “Securing G Suite and Beyond: Tales from the Trenches” that we thought would be particularly relevant to our audience. The panel explored security topics that are top of mind right now for many modern IT professionals: How have security needs evolved, and what are the biggest concerns moving forward? What important lessons have people learned? Here are five key takeaways, along with some tips and best practices the panelists shared.
Read moreAutomate Security & Compliance for Google Drive with AODocs and BetterCloud
BetterCloud has partnered with AODocs, a document management and business application platform built on top of Google Drive. Given the need for companies to identify, audit, and repair security breaches, AODocs and BetterCloud make it easy to automate security and compliance while allowing employees to focus on business critical issues. Learn more about how the two platforms work together.
Read moreHere’s What We Found in One Customer’s SaaS Environment That Caused Their IT Director to Say “Nooooo”
The widespread adoption of SaaS apps is creating new risks and ways to expose data. Unbeknownst to IT, these blind spots lie undiscovered below the surface, waiting like a dormant volcano to erupt. Over the last few months at BetterCloud, we’ve uncovered major blind spots during dozens of implementation meetings with new customers, and what we found in their SaaS environments stunned many IT teams. Here’s what we discovered.
Read moreSaaS Identity + Security Operations Management with BetterCloud and Okta
We are thrilled to announce a partnership with Okta and the launch of the new BetterCloud Connector for Okta. Here’s how this integration will provide a comprehensive solution for managing and securing business-critical data across SaaS applications.
Read moreBlind Spots in Dropbox: 5 Things You Didn’t Know Your End Users & Admins Could Do
Dropbox provides plenty of flexibility to collaborate on and streamline work, but end users and admins can do and see things you might not be aware of. For example, end users can create public links to entire folders. Admins can sign in as any user and view sensitive information. To minimize security risk and exposure, here are five blind spots you should know about.
Read moreModernizing IT with Cloud Native Patterns – Part 3
Chris Borte, director of information technology at InsideTrack, made it a priority to develop an IT infrastructure that would be impervious to ransomware. The answer? Cloud native architecture. In this final installment of our blog series on the advantages of going cloud native, he offers guidance for organizations that are ready to modernize their IT system and go cloud native. Here are his essential tips on how to get started.
Read moreModernizing IT with Cloud Native Patterns – Part 2
Yesterday we kicked off our 3-part blog series on cloud native architecture. We continue today with Part 2, which discusses additional advantages of going cloud native. This post dives into laptop management patterns, loose coupling, SSO as a default, self-service, and collaboration. Here’s what you need to know.
Read moreModernizing IT with Cloud Native Patterns – Part 1
How do you develop an IT infrastructure that’s impervious to ransomware? As InsideTrack’s director of information technology, Chris Borte had a solution: move InsideTrack to a cloud native architecture that not only secures the network but also enhances flexibility and productivity. In this 3-part series, he discusses the advantages of going cloud native and offers tips for organizations that are ready to modernize their IT system. Part 1 explores the term “cloud native” and zero trust network architecture.
Read moreSecure Your Data: Where to Start When There Are 1 Million Threats
There are seemingly a million security threats and exposures everywhere today. So where do you start? In a recent webinar, our founder and CEO David Politis explained what the new security frontier is and why IT must start paying attention to it. He also revealed the top three concerns 1,500+ IT professionals have around managing SaaS apps and offered actionable tips for mitigating them.
Read more