Posts tagged with "MFA"



Demystifying Technology: Zero-Knowledge Encryption
Blog | Endpoint Protection · 06. March 2023
Context Data is the new gold and must be protected from any unauthorized access. Cybersecurity attacks and data breaches are unfortunately happening every single day, and no organization, no matter its size or area of business, is safe from it. Most organizations are exponentially using cloud-based solutions, such as Software-as-a-Service (SaaS), to run applications and use online services like email or instant messaging without having to deal with the cost of maintaining them.

Solution Highlight: DRACOON
Blog | Endpoint Productivity · 30. January 2023
What is DRACOON? DRACOON is an Enterprise File Sync and Share (EFSS) solution developed in Germany, providing a secure data center for corporate and classified data.

Demystifying Security: Enterprise File Sync and Share (EFSS)
Blog | Endpoint Productivity · 11. January 2023
What is the challenge? Until recently, the easiest way to share documents or files with other employees was either using a USB drive (for large documents) or sending them by emails, if size allowed; email was also the option of choice when sending documents to external contacts. For larger documents, external providers like WeTransfer were used to temporally hold the file for the recipient to later retrieve and download.

Considerations When Moving to the Cloud
30. November 2022
In the past few years, with the rise of mobile devices and the need to access all services from anywhere on any type of device, organizations have been leveraging cloud providers to host more and more services, seeking to optimize both cost and availability. It seems like the obvious way forward for most organizations is to partially move to the cloud while maintaining their current on-premises infrastructure (a hybrid environment), or to move to the cloud completely. Moving to the cloud has...

Lessons Learned from a System Major Hack
Blog | Endpoint Protection · 18. October 2022
How Can We Prevent This? Once we understand what happened and how, it is now time to learn from it and build a plan to remedy it and ensure such scenarios cannot happen in the future. You know the saying, “Fool me once...” However, in this case, we know that this very company was allegedly hacked a couple of years ago and ended up paying a ransom to the hacker to delete the stolen data and “keep it quiet”; but based on what occurred, it looks like they did not learn from this and still...

Public Service Announcement: Browser in the Browser (BITB) Attacks
Blog | Endpoint Protection · 17. May 2022
With cybersecurity attacks getting increasingly sophisticated, phishing attempts have grown from convincing emails, SMS, or phone calls to convincing Single Sign-On (SSO) prompts that can expose your corporate users. Continuing the growing trend of sophisticated cyberattacks, a new attack has been reported recently that you should know about: Browser in the Browser (BITB) attack. It takes advantage of the SSO security feature used by most organizations. 

Demystifying Security: Conditional Access
Blog | Endpoint Management · 03. May 2022
What is the challenge? Nowadays, with employees able to access work resources from different types of devices (e.g., desktop, tablet, mobile phone) and different locations (e.g., office, home, public), the challenge for security and mobility teams is ensuring that only authorized devices are allowed onto the network. It’s also about striking the right balance that allows users/employees to be productive from anywhere, at any time, while still protecting corporate resources. Conditional Access...

State Sponsored Cyberwarfare at Your Doorstep: What Can You Do?
Blog | Expert's view · 09. March 2022
Theater of war is not limited to the grounds of faraway lands; your critical infrastructure is a tempting target for those looking to cause disruption or destruction as a part of their warfare. The recent armed conflict has highlighted what is possible and the potential for those state sponsored actors. In the US, the Cybersecurity and Infrastructure Security Agency (CISA) has released recommendations on how organizations can protect themselves. No organization, no matter the size or area of...

Cyber Security Solutions
Blog | Endpoint Protection · 01. March 2022
Protecting your organization against cybersecurity threats is not as simple as installing the most expensive security products available on the market, but rather understanding your own business and security needs how those needs impact your infrastructure, all the components involved, how they are prone to cyberattacks, and how you can protect them.

Accountability in your digital workspace
06. October 2020
As we wrap up our blog series on 7 things you can do to improve your mobility ecosystem, we would like to leave you with this final thought: the success of your digital workspace is predicated on the effort from across your entire team – from the front-line resources in their daily leveraging of the mobility solution, to your back office team consuming the data generated throughout the business and contributing to its agility. At the end of the day, the singular goal for the organization is...

Show more