Use el acceso condicional para mejorar la postura de seguridad de su fuerza de trabajo remota

Ya que el trabajo remoto se está convirtiendo en la norma, las políticas tradicionales para el control del acceso que rigen cómo se otorga el acceso y bajo qué circunstancias, tienen una necesidad de una renovación inevitable.
Implementar políticas de… Continue reading Use el acceso condicional para mejorar la postura de seguridad de su fuerza de trabajo remota

Five ways to hack MFA, and the FBI’s mitigation strategy [E-book]

Advances in technology have led to the creation of multiple data security methods that help organizations secure sensitive data from the prying hands of attackers. Of these, multi-factor authentication (MFA) is one of the most important security measu… Continue reading Five ways to hack MFA, and the FBI’s mitigation strategy [E-book]

Avert cyberattacks against MFA using FBI-recommended countermeasures [Webinar]

With the rise of remote work, multi-factor authentication (MFA) has become more essential than ever. MFA can be used to protect authentications happening on different resources like workstations, VPNs, and enterprise applications. MFA effectively stop… Continue reading Avert cyberattacks against MFA using FBI-recommended countermeasures [Webinar]

Free for unlimited users: Password Expiration Notifier for Active Directory

Changing your password periodically is vital and helps prevent hackers from accessing your network resources and inflicting damage. If users fail to change their passwords when prompted for security reasons, they get locked out of their accounts, and a… Continue reading Free for unlimited users: Password Expiration Notifier for Active Directory

Securing VPN and RDP access to sensitive resources [Free e-book and webinar]

At times, life during COVID-19 pandemic can feel like something from a dystopian novel. If anyone told us ahead of time that we’d be working from home due to a deadly virus outbreak in 2020, we probably wouldn’t have believed …
The post Securing VPN a… Continue reading Securing VPN and RDP access to sensitive resources [Free e-book and webinar]

How to stop rampant, poor password practices

We’ve all heard about the consequences of poor password practices again and again. Yet, users still reuse their passwords for multiple accounts, create weak passwords, or use dictionary words and compromised passwords. Why do users still follow these … Continue reading How to stop rampant, poor password practices