author-image

Tim Keary

Tim writes extensively on network administration topics helping businesses and entrepreneurs to keep their data and assets protected. He was previously the cybersecurity editor at VentureBeat and has been freelance since 2017.

Articles by Tim

Having the latest Microsoft Office updates is crucial for ensuring that you’re protected against the latest threats. In this article, we’re going to look at how to update Microsoft Office 365.
By Tim Keary in Net Admin on January 9, 2023
Keeping an up-to-date inventory of IT software isn’t an easy task, but computer inventory management software can make it much more manageable. Learn which are the best tools to stay on top of your inventory.
By Tim Keary in Net Admin on February 12, 2024
If you’re in the market for a vulnerability scanner, then Nessus and OpenVAS are two names you’ll hear about regularly. In this article, we’re going to compare Nessus vs OpenVAS to find out which is best.
By Tim Keary in Net Admin on April 27, 2022
While Splunk is an excellent tool, there are plenty of other viable alternatives to choose from. We show you the best alternatives to Splunk.
By Tim Keary in Net Admin on January 12, 2024
In this article we look at some of the most common SNMP vulnerabilties. We include a brief overview of how to scan for SNMP vulnerabilities which you can follow along step-by-step.
By Tim Keary in Net Admin on February 1, 2022
Monitoring NGINX can be complicated if you don’t have the right tools due to a lack of transparency. Thankfully there are many application monitoring solutions on the market equipped to monitor NGINX performance.
By Tim Keary in Net Admin on February 13, 2024
We review the best Dynamic DNS Providers on the market.
By Tim Keary in Net Admin on March 18, 2024
Running regular network security scans is a must for keeping your network protected. Follow our step-by-step guide on how to perform a virus scan on your network.
By Tim Keary in Net Admin on January 17, 2024
While Elasticsearch breaches are common, they can be avoided by implementing the necessary security measures and configurations to reduce the number of vulnerabilities hackers can exploit. Our guide and best practices will help you keep Elasticsearch secure.
By Tim Keary in Net Admin on March 12, 2024
Page 2 of 21