Posts tagged with "Security"

20. October 2020
Demystifying Security: Virtual Private Network (VPN)
A Virtual Private Network (VPN) is a proven technology that allows secure access to corporate resources from outside of the corporate network, through unmanaged and unsecure networks like the mother of all networks, The Internet. One would typically think of a sales consultant connecting to the company network from his laptop in a hotel or customer office to check his email, download a sales pitch, or access the internal CRM system to prepare a PO. 
06. October 2020
Accountability in your digital workspace
As we wrap up our blog series on 7 things you can do to improve your mobility ecosystem, we would like to leave you with this final thought: the success of your digital workspace is predicated on the effort from across your entire team – from the front-line resources in their daily leveraging of the mobility solution, to your back office team consuming the data generated throughout the business and contributing to its agility. At the end of the day, the singular goal for the organization is...
29. September 2020
As we saw in our previous article about Multi-Factor Authentication (MFA), one of the key parts of security is ensuring the identity of the users accessing your corporate resources. This can be combined with other well-known technologies like Single Sign-On (SSO) to make that process not only as secured as possible but also as simple and transparent for the end-users, so they are not tempted to use easy and weak credentials.  But identity is just one piece, considering that once identified,...
25. August 2020
What is Multi-Factor Authentication?  Multi-Factor Authentication (MFA) is an authentication method in which a user is required to present two or more pieces of evidence (also known as factors) to authenticate. Factors include:  Knowledge: Something the user and only the user knows (ex: credentials like password and PIN)  Possession: Something the user and only the user has (ex: mobile device, token, credit card CVV)  Inherence: Something the user and only the user is (ex: fingerprint,...
14. August 2020
Every organization now has tablets and smartphones regularly connecting to their data. For many IT administrators, the default way to handle those devices is to deploy a Mobile Device Management (MDM) solution – which makes sense. After all, you should have an inventory of your devices and be able to manage them. But what about when one of your employees receives a malicious phishing link on their mobile device or they accidentally install a malicious app? To complete your mobile strategy and...
13. August 2020
Twitter recently experienced one of its most notable breaches. On July 15, an unauthorized party entered its backend infrastructure and gained access to 130 accounts belonging to high-profile individuals such as Barack Obama, Kanye West, Bill Gates and Elon Musk. The attackers stole more than $100,000 by tweeting out Bitcoin phishing scams and snatched data from some of the handles.
04. August 2020
What is MTD?  Yet another three-letter acronym in the increasingly complex mobility world?  Well, not exactly. MTD stands for Mobile Threat Defense and, to make a long story short, this is comparable to the typical antivirus software installed on your desktop computers but extended to a whole new level to tackle the challenges brought on by our ever-connected mobile devices. 
28. July 2020
Every project is like a sailboat; it needs a Captain, bosun, and deck hand, each knowing what they need to do to ensure the boat reaches its intended destination. Likewise, every key component of your organization needs to be owned and anchored by someone to ensure it is managed and monitored properly.  This can be easy in smaller environments, with one CTO or IT Manager and sometimes a small support team to assist, but even so, it is important to define who is responsible for what, from top...
23. July 2020
Security is a delicate combination of both technologies and processes, ultimately relying on the end-user to act in accordance with the defined standards and practices. Authenticating your users is the first step. In the past, this was relatively easy to manage as users would connect to the company network and resources mostly using the same computer (and occasionally maybe a laptop from an external location).
14. July 2020
Learn about simple solutions to protect your data and minimize frustration and confusion for end-users. With the exponential growth of mobile device usage in the workplace, security has become one of the primary concerns for companies that need to find a good balance between flexibility and protection, to ensure a good end-user adoption of mobile technologies at work while keeping their infrastructure safe from potential risks at the same time. Every system, no matter how strong, has a weak...

Show more