Designing a BYOD Approach for the Future

  Bring-your-own-device (BYOD) policies were some of the many things that changed when the COVID-19 pandemic hit. A study from Palo Alto Networks by ONR found 60% of companies expanded their BYOD policies to help employees manage the shift to remote work at the beginning of the pandemic. However, the convenience that the new BYOD […]

The post Designing a BYOD Approach for the Future appeared first on Security Intelligence.

Continue reading Designing a BYOD Approach for the Future

Beyond Password Safety: How to Make Employee Sign-On Safe and Convenient

When did you last change your work password? Was it when the system prompted you? When you were first hired? Or maybe the answer doesn’t matter. When it comes to password safety, old adages don’t always apply anymore. Let’s take a look at what today’s business password management really needs by focusing on the valuable […]

The post Beyond Password Safety: How to Make Employee Sign-On Safe and Convenient appeared first on Security Intelligence.

Continue reading Beyond Password Safety: How to Make Employee Sign-On Safe and Convenient

How to Check for Blind Spots in Your Security Program

An effective security program does more than merely take on the appearance of cyber resilience. Learn how to look behind the curtain of your enterprise security.

The post How to Check for Blind Spots in Your Security Program appeared first on Security Intelligence.

Continue reading How to Check for Blind Spots in Your Security Program

Is Employee Negligence Threatening Your Information Security?

With a little education and a lot of communication, security leaders can steadily reduce employee negligence over time through consistent, comprehensive awareness training.

The post Is Employee Negligence Threatening Your Information Security? appeared first on Security Intelligence.

Continue reading Is Employee Negligence Threatening Your Information Security?

Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks

By integrating phishing intelligence with an SIEM solution, security analysts can proactively monitor APTs and manage risks related to phishing attacks.

The post Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks appeared first on Security Intelligence.

Continue reading Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks

Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks

By integrating phishing intelligence with an SIEM solution, security analysts can proactively monitor APTs and manage risks related to phishing attacks.

The post Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks appeared first on Security Intelligence.

Continue reading Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks