The new cyber risk reality of COVID-19 operating mode

There’s little, if any, precedent for the time we’re experiencing right now with a pandemic changing the corporate landscape in profound ways. But while many are reacting in real-time to the workforce transitioning into the work-from-home-force, in man… Continue reading The new cyber risk reality of COVID-19 operating mode

99% of enterprise users reuse passwords across accounts

Very few users take appropriate action to significantly reduce the risk of password compromise, according to a Balbix report. The study found that more than 99% of enterprise users reuse passwords, either across work accounts, or between work and perso… Continue reading 99% of enterprise users reuse passwords across accounts

Destination Cyberlandia: 3 keys to cyber happiness amid COVID-19

Close your eyes and imagine an optimum state of happiness. People may envision different things — a beach, a hike through the woods, a family meal — but most cybersecurity teams are dreaming of what I like to call Cyberlandia: the optimum state of cybe… Continue reading Destination Cyberlandia: 3 keys to cyber happiness amid COVID-19

Helping healthcare combat cyber attackers

Hospitals and other healthcare organizations around the globe are under immense pressure as they test and care for patients with COVID-19. They are also under siege by cyber attackers. This month, Interpol released a warning to hospitals and other medi… Continue reading Helping healthcare combat cyber attackers

Future of work: Delivering a modern workspace

We are all painfully aware how the current climate of lockdown and working from home has focused the conversations within the technology community regarding the pros and cons of remote working. And whilst we can assume that relocating to a home office … Continue reading Future of work: Delivering a modern workspace

How to prevent permission bloat: Overlooked and hidden access

When it comes to your organizational security, you should leave no stone unturned. Overlooked access rights are one of the most unnoticed security threats your organization can face – and it’s less of a stone and more of a somehow-overlooked, but ever-… Continue reading How to prevent permission bloat: Overlooked and hidden access

Why you should be rushing to deploy multi-factor authentication to support remote work

With a third of the population currently working remotely and great uncertainty regarding when this situation is going to change, organizations must shift their business operations to support long-term remote working. According to a recent Gartner surv… Continue reading Why you should be rushing to deploy multi-factor authentication to support remote work

Help your helpdesk: Empower employees to self-reset their AD account password

The COVID-19 pandemic has triggered a momentous shift for many organizations: remote work has become the new normal. Businesses that were skeptical before are now being forced to make it work, and many are discovering that the work can be done as well … Continue reading Help your helpdesk: Empower employees to self-reset their AD account password

Protecting corporate data in popular cloud-based collaborative apps

Cloud adoption has grown at an astonishing rate, providing organizations with the freedom to store data in numerous cloud applications that meet their specific business demands. Additionally, migrating to the cloud gives employees the ability to access… Continue reading Protecting corporate data in popular cloud-based collaborative apps