Posts tagged with "Security"



17. May 2022
Public Service Announcement: Browser in the Browser (BITB) Attacks
With cybersecurity attacks getting increasingly sophisticated, phishing attempts have grown from convincing emails, SMS, or phone calls to convincing Single Sign-On (SSO) prompts that can expose your corporate users. Continuing the growing trend of sophisticated cyberattacks, a new attack has been reported recently that you should know about: Browser in the Browser (BITB) attack. It takes advantage of the SSO security feature used by most organizations. 
03. May 2022
Demystifying Security: Conditional Access
What is the challenge? Nowadays, with employees able to access work resources from different types of devices (e.g., desktop, tablet, mobile phone) and different locations (e.g., office, home, public), the challenge for security and mobility teams is ensuring that only authorized devices are allowed onto the network. It’s also about striking the right balance that allows users/employees to be productive from anywhere, at any time, while still protecting corporate resources. Conditional Access...
21. April 2022
Data Loss Protection (DLP)
According to the 2021 Insider Threat Report by Cybersecurity Insiders, 98% of all organizations are vulnerable to insider threats. It is believed that in recent years insider threats are responsible for around 60% of all compromised systems and data lost.
19. October 2021
Security Maturity Model Part 2
How do you provide cybersecurity for an already complex ecosystem? How do we keep it simple for the end-users, so they don’t circumvent protocols put in place designed to protect them and their devices? Continuing our Security Maturity Model blog series, we’re looking into the incremental needs of larger organizations, or an organization spread out globally. How do we stay secure, while still providing seamless access to resources within the ecosystem and...
14. October 2021
Security Maturity Model
When it comes to businesses and enterprises, cybersecurity is predicated on multiple factors – whether it be the number of employees, how the environment is deployed, potential attacks and attack vectors, the type of devices used in the ecosystem, or the corporate device usage policies. On top of these factors, there is a vast array of security solutions to choose from, each claiming to protect your ecosystem and avoid costly downtime or – even worse – damage to your reputation. We will...
07. July 2021
Behavior based security
Traditional antivirus software is no longer enough to protect against today’s cyber-attacks. In our hyperconnected world, it only takes one wrong click to propagate to thousands of machines, evidenced by the WannaCry attack that infected roughly 230k machines in 150 countries after day one.
26. May 2021
Post Ransomware Recovery - What Do I Do Now?
Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.
06. April 2021
Why Training is immportant
When it comes to providing employee training, many organizations must weigh the costs vs. benefits. While training undeniably takes time and money, you will find that over time not training your employees will cost your company a lot more. 
01. March 2021
The New Terms of WhatsApp and the Consequences for Businesses
Recently Whatsapp announced an update of its terms and privacy policy, and made several significant changes that were kind expected since the acquisition of Whatsapp by Facebook in 2014.
20. January 2021
End of Microsoft Windows 7
Der Spiegel* und das Handelsblatt* berichteten zuletzt, dass noch Millionen von Microsoft® Windows® 7 Rechnern betrieben werden und auch heute noch in Deutschland über 4 Millionen PCs mit Windows 7 im Einsatz sind, obwohl es gefährliche Sicherheitslücken gibt.

Show more