With the right planning and actions, companies affected by the COVID-19 outbreak can ensure the safety of their employees while still moving ahead with crucial business objectives.
Download this white paper and learn how to:
Enable direct connectivity via local internet breakouts;
Secure third-party access to...
Enterprises must be agile, not only in development, but in operations, and never more so than when a disaster hits.
Download this crisis-planning checklist to have at the ready and learn how to:
Plan for increased cyberthreat risks, particularly situational attacks;
Adjust business-security priorities;
Verify...
Cognizant estimates that the April ransomware attack that affected its internal network will cost the IT services firm between $50 and $70 million, according to the company's latest financial report. The company has said that the Maze ransomware gang was behind the attack.
The Covid-19 crisis has forced businesses of all sizes around the world to change operations in a variety of unprecedented ways.
To navigate and halt the spread of the pandemic, organizations have adopted strict remote work policies where employees have to maintain work and productivity from the confines of their...
Over the past couple of decades we have seen the number of employees that work from home increase dramatically. Today, due to COVID-19 quarantine policies around the globe, many companies are faced with a new paradigm--employees must work from home for an undefined period of time.
At OneLogin, our primary focus is...
In honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique.
Traditional perimeter defenses are dead and organizations are under greater pressure to embrace new approaches to cyber security that reduce costs, increase ROI and provide business resilience in light of the current climate with Covid-19.
With 2020 being a year for safe bets only, this webinar will reflect on...
The ability to support remote workers can help improve an organization's business continuity plan. It allows the organization to adapt when unforeseen circumstances, such as natural disasters or a pandemic, make it impossible for employees to work on-site.
Under these circumstances, an organization may be forced to...
Enterprises globally are suddenly
challenged to support and secure the
largest remote workforce in history.
Michael Goldgof of Barracuda shares
insight on how to scale up this capacity
securely, maximizing existing tools.
Download this eBook to learn more about:
Unique challenges articulated by customers;
How...
Ransomware, phishing, extortion scams - they all are
using COVID-19 themes. But socially engineered attacks
were already on the rise before the pandemic, say Olesia
Klevchuk and Nishant Taneja of Barracuda, who share
insights on the evolution of cloud-based email defences.
Download this eBook to learn more...
The shift to working at home is opening the door to cybersecurity incidents. Some 23% of respondents to a small survey conducted by the training organization (ISC)2 say their organization has experienced an increase in cybersecurity incidents since transitioning to remote work.
The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.
The number of brute-force attacks targeting RDP connections has spiked since the COVID-19 pandemic forced employees all over the world to work at home, according to an analysis from security firm. These types of attacks can lead to malware infections, cyber espionage and other threats.
Security teams are facing a worst-case scenario - juggling identity and access management while detecting threats for an infrastructure that is no longer within the safe confines of their castle walls.
The fastest to react to this tectonic shift have been the hackers. How are they planning their attacks? What can...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.