Posts tagged with "Security"



Mobile Threat Defense
Blog | Expert's view · 11. July 2022
Spoiler: Downloading apps is a risky way You may have heard about the dangers of clicking suspicious email links or entering personal information on inappropriate websites But did you know that, despite this, you are unknowingly taking hidden security risks?

Public Service Announcement: Browser in the Browser (BITB) Attacks
Blog | Endpoint Protection · 17. May 2022
With cybersecurity attacks getting increasingly sophisticated, phishing attempts have grown from convincing emails, SMS, or phone calls to convincing Single Sign-On (SSO) prompts that can expose your corporate users. Continuing the growing trend of sophisticated cyberattacks, a new attack has been reported recently that you should know about: Browser in the Browser (BITB) attack. It takes advantage of the SSO security feature used by most organizations. 

Demystifying Security: Conditional Access
Blog | Endpoint Management · 03. May 2022
What is the challenge? Nowadays, with employees able to access work resources from different types of devices (e.g., desktop, tablet, mobile phone) and different locations (e.g., office, home, public), the challenge for security and mobility teams is ensuring that only authorized devices are allowed onto the network. It’s also about striking the right balance that allows users/employees to be productive from anywhere, at any time, while still protecting corporate resources. Conditional Access...

Data Loss Protection (DLP)
Blog | Endpoint Protection · 21. April 2022
According to the 2021 Insider Threat Report by Cybersecurity Insiders, 98% of all organizations are vulnerable to insider threats. It is believed that in recent years insider threats are responsible for around 60% of all compromised systems and data lost.

Security Maturity Model Part 2
Blog | Endpoint Protection · 19. October 2021
How do you provide cybersecurity for an already complex ecosystem? How do we keep it simple for the end-users, so they don’t circumvent protocols put in place designed to protect them and their devices? Continuing our Security Maturity Model blog series, we’re looking into the incremental needs of larger organizations, or an organization spread out globally. How do we stay secure, while still providing seamless access to resources within the ecosystem and...

Security Maturity Model
Blog | Endpoint Protection · 14. October 2021
When it comes to businesses and enterprises, cybersecurity is predicated on multiple factors – whether it be the number of employees, how the environment is deployed, potential attacks and attack vectors, the type of devices used in the ecosystem, or the corporate device usage policies. On top of these factors, there is a vast array of security solutions to choose from, each claiming to protect your ecosystem and avoid costly downtime or – even worse – damage to your reputation. We will...

Behavior based security
07. July 2021
Traditional antivirus software is no longer enough to protect against today’s cyber-attacks. In our hyperconnected world, it only takes one wrong click to propagate to thousands of machines, evidenced by the WannaCry attack that infected roughly 230k machines in 150 countries after day one.

Post Ransomware Recovery - What Do I Do Now?
26. May 2021
Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.

Why Training is immportant
06. April 2021
When it comes to providing employee training, many organizations must weigh the costs vs. benefits. While training undeniably takes time and money, you will find that over time not training your employees will cost your company a lot more. 

The New Terms of WhatsApp and the Consequences for Businesses
01. March 2021
Recently Whatsapp announced an update of its terms and privacy policy, and made several significant changes that were kind expected since the acquisition of Whatsapp by Facebook in 2014.

Show more