Posts tagged with "Security"
17. May 2022
With cybersecurity attacks getting increasingly sophisticated, phishing attempts have grown from convincing emails, SMS, or phone calls to convincing Single Sign-On (SSO) prompts that can expose your corporate users. Continuing the growing trend of sophisticated cyberattacks, a new attack has been reported recently that you should know about: Browser in the Browser (BITB) attack. It takes advantage of the SSO security feature used by most organizations.
03. May 2022
What is the challenge? Nowadays, with employees able to access work resources from different types of devices (e.g., desktop, tablet, mobile phone) and different locations (e.g., office, home, public), the challenge for security and mobility teams is ensuring that only authorized devices are allowed onto the network. It’s also about striking the right balance that allows users/employees to be productive from anywhere, at any time, while still protecting corporate resources. Conditional Access...
21. April 2022
According to the 2021 Insider Threat Report by Cybersecurity Insiders, 98% of all organizations are vulnerable to insider threats. It is believed that in recent years insider threats are responsible for around 60% of all compromised systems and data lost.
19. October 2021
How do you provide cybersecurity for an already complex ecosystem? How do we keep it simple for the end-users, so they don’t circumvent protocols put in place designed to protect them and their devices? Continuing our Security Maturity Model blog series, we’re looking into the incremental needs of larger organizations, or an organization spread out globally. How do we stay secure, while still providing seamless access to resources within the ecosystem and...
14. October 2021
When it comes to businesses and enterprises, cybersecurity is predicated on multiple factors – whether it be the number of employees, how the environment is deployed, potential attacks and attack vectors, the type of devices used in the ecosystem, or the corporate device usage policies. On top of these factors, there is a vast array of security solutions to choose from, each claiming to protect your ecosystem and avoid costly downtime or – even worse – damage to your reputation. We will...
07. July 2021
Traditional antivirus software is no longer enough to protect against today’s cyber-attacks. In our hyperconnected world, it only takes one wrong click to propagate to thousands of machines, evidenced by the WannaCry attack that infected roughly 230k machines in 150 countries after day one.
26. May 2021
Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.
06. April 2021
When it comes to providing employee training, many organizations must weigh the costs vs. benefits. While training undeniably takes time and money, you will find that over time not training your employees will cost your company a lot more.
01. March 2021
Recently Whatsapp announced an update of its terms and privacy policy, and made several significant changes that were kind expected since the acquisition of Whatsapp by Facebook in 2014.
20. January 2021
Der Spiegel* und das Handelsblatt* berichteten zuletzt, dass noch Millionen von Microsoft® Windows® 7 Rechnern betrieben werden und auch heute noch in Deutschland über 4 Millionen PCs mit Windows 7 im Einsatz sind, obwohl es gefährliche Sicherheitslücken gibt.