Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

7 IT Asset Management (ITAM) Best Practices for 2022

Technology has become increasingly prevalent in business operations, to the point that it's practically mandatory. IT assets can range from individual computers to entire networks. Since there are typically countless different IT assets, the process of IT Asset Management has become increasingly essential.

4 Big Risks to Your MSP Business: And Candid Tips to Mitigate Them

Owning an IT business isn't for the faint of heart. Risk naturally comes with the territory, but according to successful MSP veterans, owners can do several key things to mitigate their risk and give themselves a foot up over the competition. Instead of preparation and proactivity, many businesses find themselves where quick reactions to risks that arise are the only way forward—business whack-a-mole, for lack of a better term.

Get Back to the Basics for World Backup Day 2022

In recent weeks, international headlines have been dominated by the Russia-Ukraine war and its potential to escalate into cyberspace due to punishing economic sanctions by the west. On March 21st, 2022, the Biden administration released a statement calling for the public and private sector to “accelerate efforts to lock their digital doors” in light of the Russian cyber threat.

Types of Backups: Full, Incremental, & Differential

In this day and age, important business information is more likely found stored on networks and devices than recorded on physical paper. If a disaster strikes and the safety of your data is compromised, having solid backups in place is the key to reduced RTOs (Recovery Time Objective) and having peace of mind. Multiple backup types are available to store and secure your data safely. Let's discuss the different types of backup, their features, and the benefits of each type.

How to Lower CPU Usage

Is your Central Processing Unit (CPU) maxing out and slowing your PC to a crawl? There's a good chance you have experienced this issue if you run high-demand software for things like graphic design, video editing, or gaming. It can be frustrating enough without factoring in how hard it can be to trace down the source of the problem. In this article, we'll look at how to remedy high CPU usage on your machine or machines.

Advanced Automation in NinjaOne: Auto-Install Applications

This blog post is a companion piece to our Advanced Automation in NinjaOne webinar, providing step-by-step instructions for setting up the Auto-Install Applications example explored during that webinar. The full webinar recording provides multiple examples, tips, and suggestions. This blog post and webinar recording should be consumed together, click here to jump ahead to an in-depth explanation of the auto-install example or you can view the entire recording below.

5 Tips for Creating an Effective & Scalable Patch Management Policy

When it comes to the world of IT, many things can go wrong on devices and with software. These imperfections can often result in security risks and vulnerabilities, so patches are applied to fix any defects. Patch management consists of managing the identification and remediation of these vulnerabilities in your IT environment. Patching is one of the most important components when it comes to managing IT vulnerabilities, so it is crucial to have an effective patch management policy in place.

NinjaOne Releases Ninja Ticketing Into General Availability, Expanding Its Unified IT Operations Platform For All Customers

Today, we’re pleased to announce that Ninja Ticketing has exited beta and entered general availability, giving our partners a flexible, easy-to-use ticking solution built specifically for IT workflows. Since debuting in September, NinjaOne has over 350 customers actively using Ninja Ticketing as their primary service desk software.

Server Monitoring and Alerting

Server and IT infrastructure monitoring are critical to ensuring the performance and longevity of your client systems. Even more so, remote monitoring technology, in particular, has helped define the entire modern IT industry. In this post, we’re going to discuss several of the main monitoring concepts, including metrics, alerting, and monitoring, and why they are important.