All posts in IT


What Are Bug Bounties? The Top 20 Bounty Lists and Why They’re Useful for Companies

bug bounties

Hacking is constantly misunderstood in pop culture.

From an 11-year-old crashing Wall Street and flying through 3D landscapes in Hackers to “hacking” an entire city in Watch Dogs, it’s easy to see why it’s seen as an extreme and dangerous hobby to have.

In reality, there are plenty of “white-hat” (well-intentioned) hackers who help companies to identify security weaknesses in their programs through bug bounties.

So, to de-mystify the air around bug bounty programs and white-hat hacking, this post will show you:

  • What bug bounties are
  • How you can start earning money through them
  • What to consider when setting up your own bug bounty program
  • 20 examples of top bug bounty programs you can take inspiration from or take part in yourself

Let’s get started.

Continue Reading

The 11 Best Screen Sharing Apps (And How to Use Them)

screen sharing
Whether you’re in a meeting or doing customer support, screen sharing is one of the best ways to illustrate your point without frustrating anyone in the call.

That is if you can get an app which lets you share your screen without an issue.

We’ve all been there before – you’ve shown up early to a meeting only to have your technology die on you. Maybe the call quality was so bad you couldn’t hear each other speak or perhaps the other person was forced to download a new app before being able to see your screen.

No matter your troubles, this list will clear up which screen sharing apps are the best for you to use, why, and why other options aren’t up-to-scratch.

I’ll be covering:

  • Zoom
  • Join.me
  • Skype
  • GoToMeeting
  • Slack
  • Appear.in
  • Screenleap
  • Google Hangouts
  • Mikogo
  • Chrome Remote Desktop
  • USE Together

Ready? Let’s go.
Continue Reading

What is a Customer Support Engineer? And How to Know if You Need One

customer support engineerThere are so many layers to a modern support team.

Some companies will have countless reps working hard each day to champion the customer and empower them to do what they need to do.

On top of that, you might have members of the support team who double up as part of the product design team; looking for niche use cases or areas where customers don’t find the product intuitive.

Support teams may even have specialized roles which look to help customers achieve certain business goals, rather than just guidance with the software.

In this Process Street article, we’re going to look at one of the unsung specialists of the modern age: the customer support engineer.

With the rise of SaaS products particularly, the customer support engineer has become a meeting point for customers, sales, design, and development.

A Jack or Jill of all trades!

We’re going to explore exactly what a customer support engineer is, what they do, and when or why you might need one!

Continue Reading

12 IT Processes to Avoid Server Failures and Client Headaches

IT Processes

“Without IT process management, there is no way to assure [cost-effective IT services]” – Casper van der Kolk

Whether you’ve been in the IT business for years or are just starting to make your mark, there’s no question that managing your processes is vital.

With processes, you can you do more with your current resources by standardizing and optimizing your work. And, when your team knows exactly what to do for each recurring task, they can greatly improve their productivity and motivation.

However, the benefits don’t just stop at a happier and more efficient team.

Integrating these recurring workflows into your IT management resource basket can reduce incident response times, increase customer satisfaction, ensure security compliance, manage department stock and – perhaps best of all – enforce consistency, to give you peace of mind that everything is running as expected.

Continue Reading

How to Enable Two-Factor Authentication for Your Team

two factor authenticationBeing secure online is of greater and greater importance. As businesses operate almost entirely online and sensitive information finds itself living full time in the cloud, we have to make sure we have appropriate measures in place to keep information safe.

One tried and tested way of promoting security is the use of failsafes in login systems. This is what’s referred to as Two Factor Authentication (2FA) or Multi Factor Authentication (MFA).

This means that someone could get hold of your email and password, yet your data is still kept safe.

Whether you’re already familiar with the terminology or not, you’re certainly familiar with the concept.

In this Process Street article, we’ll look at:

  • Why is two factor authentication important?
  • What two factor authentication is
  • The 2 classic examples of 2FA: banks and Apple
  • How you can implement two factor authentication in your team
  • Free Process Street template: How to enable two factor authentication with Authy, Google, and Slack

Continue Reading

How to Create an Efficient Incident Response Plan (Including a 17-Step Checklist)

Benjamin Brandall
March 28, 2018
IT

Only 9% of information security professional believe their organization has effective incident response processes. The biggest issue? Well, you’re reading Process Street so you probably guessed it: the lack of standardization. Almost half of the respondents to the SANS Incident Response Survey said that their lack of a formal incident response procedure was holding them back and causing security issues.

It’s not even like preparing for serious security incidents is wasted time or that you’d be going overboard with precautions; 61% of companies have experienced critical incidents in the last two years — that includes data breaches, unauthorized access, and denial of service attacks.

Continue Reading

34 Linux Server Security Tips & Checklists for Sysadmins

Benjamin Brandall
March 21, 2018
IT

Linux (or Unix-like) software runs the majority of the world’s servers. This is owing to its incredible power, transparency, and customizability.

While Windows is built for the average home-officer, gamer, or grandparent — and comes with its own set of controls to stop these users destroying their operating systems — Linux enjoys a total lack of restrictions but also exposes the user to an incredible amount of complexity.

Continue Reading

How TechMD Use Process Street to Manage All Their Recurring Processes

How-TechMD-Use-Process-Street-to-Manage-All-Their-Recurring-ProcessesTechMD is an award-winning IT solutions firm specializing in strategic consulting and managed services. To help TechMD manage cybersecurity operations and client workloads, the company turned to Process Street to facilitate the necessary process management efforts.

We spoke with company President Sebastian Igreti about TechMD’s experience of Process Street.

Continue Reading

6 Server Setup Checklists for Sysadmins (Apache, Ubuntu, Proxy, FTP, and More)

Benjamin Brandall
February 7, 2018
IT

How do you set up your servers? You probably just know how to, like it’s an instinct. But is it the absolute best way to do it? Are you leaving holes in your security, or forgetting to add users that desperately need access?

Or, look at it another way:

If you’re the only one who knows your server setup methods, how are you going to train your team? Processes are a solid basis for your business’ expansion as the question of how to do a task is answered automatically, in the clearest and most efficient way every time.

Continue Reading

How Salesforce Built the Fort Knox of Data Security

Benjamin Brandall
November 15, 2017
IT

Think about what’s at stake if Salesforce suffered a breach…

  • American Express, Philips, Vodafone, Virgin, Western Union, GE, the U.S. government, and 150,000 organizations risk their communications leaking to the public
  • This includes trade secrets, financial documents, passwords, and bank details
  • Hackers could believably impersonate bank employees or government officials

It’s a terrifying concept for Salesforce customers, and just as frightening for Salesforce themselves; if a breach like that happened, their $61b company would suffer tremendously.

A company as well-known as Salesforce has a huge target on its back, so it needs to have the highest security standards even while scaling up and innovating rapidly.

Continue Reading

Get a free Process Street account
and take control of your workflows today.

No Credit Card Required