Covid-19 caused organizations to sprint towards a remote workforce at an incredible pace. Now, that sprint has turned into a marathon, as more businesses are leaning towards keeping the majority of their workforce remote for the foreseeable future. The new normal is...
Category:
Remote Access
Your Voter Registration Needs ‘Extra Details’ – The Latest Phishing Lure
Today is election day, and 100 Million people have already voted. In all probability, this year’s total number of voters is on pace to exceed 2016 elections. While the voting is on, there is a real concern over disinformation campaigns that might affect the outcome....
Microsoft October 2020 Patch Tuesday Fixes & How Cognitive Trust Can Help
Last week, Microsoft released its monthly batch of security updates, which has come to be known as Patch Tuesday, and patched 87 vulnerabilities across a wide range of Microsoft products. The fixes address critical RCE (Remote Code Execution) bugs in windows TCP/IP...
How SDP can prevent Ransomware attacks in Healthcare
2020 has been a banner year for ransomware in health care organizations. According to healthitsecurity.com, “Universal health Services, one of the largest US health systems, confirmed on October 3, 2020 that the ransomware attack reported earlier last week has...
Beyond Legacy VPN: 10 Must-Have Features for Replacing Your legacy VPN
In the wake of the global COVID-19 pandemic, a majority of organizations have swiftly transitioned vast portions of their workforces to remote work. With that, security and networking leaders have been faced with a dual challenge: rapidly scaling work-from-home...
Obviating Traditional VPNs
The ever changing threat landscape coupled with current global pandemic is forcing enterprises to rethink their remote access strategy. Enterprises need adaptive security and scalable remote access more than ever before. Traditional remote access VPNs, the norm for...
5 Stages to Adopt a “Zero Trust” Networking Model
Develop a level-headed strategy Are you a cybersecurity professional interested in Zero Trust, but don’t know where to begin? Perhaps you embarked on a Zero Trust journey with multi-factor authentication (MFA) but got stuck while test driving it in other areas, like...