Theater of war is not limited to the grounds of faraway lands; your critical infrastructure is a tempting target for those looking to cause disruption or destruction as a part of their warfare. The recent armed conflict has highlighted what is possible and the potential for those state sponsored actors. In the US, the Cybersecurity and Infrastructure Security Agency (CISA) has released recommendations on how organizations can protect themselves. No organization, no matter the size or area of...
Protecting your organization against cybersecurity threats is not as simple as installing the most expensive security products available on the market, but rather understanding your own business and security needs how those needs impact your infrastructure, all the components involved, how they are prone to cyberattacks, and how you can protect them.
After an unconventional year like 2020, with an unexpected pandemic putting the whole world on a hold, 2021 was largely expected to be back to “business as usual” with employees returning to the office as vaccines became available and the threat of COVID dwindled.
At their latest Worldwide Developer Conference (WWDC) this past summer, Apple announced several new features in their soon-to-be-released iOS 15, noting an emphasis on communication changes and on-device intelligence. For this article we will focus on the new enterprise features, allowing easier and more advanced management of end-user devices while simultaneously improving the end-user experience and privacy.
Employees working from home on a company-provided computer are putting businesses at risk with one in four consumers admitting to using their work email or password to log in to consumer websites and apps such as food delivery, online shopping and even dating apps.
While we can certainly agree that 2020 was unconventional to say the least, we can now look back and appreciate some of the positives that arose. In response to COVID-19 and the resulting precautionary protocol, everyone – businesses and individuals alike – had to change how they go about their daily lives. Many companies have been obligated to keep their employees at home if deemed “non-essential,” but the challenge remains of having operations and customers to attend to.
One of the numerous challenges of modern IT is to provide secure, controlled, and seamless connection to enterprise resources from any type of mobile device. Users need to be able to connect from anywhere, most of the time from the Internet (i.e. outside of the controlled company perimeter), and for things to be as easy and transparent as possible to offer the best user experience without compromising security and privacy.
A Virtual Private Network (VPN) is a proven technology that allows secure access to corporate resources from outside of the corporate network, through unmanaged and unsecure networks like the mother of all networks, The Internet. One would typically think of a sales consultant connecting to the company network from his laptop in a hotel or customer office to check his email, download a sales pitch, or access the internal CRM system to prepare a PO.