Browser backdoors: Securing the new frontline of shadow IT

Browser extensions are a prime target for cybercriminals. And this isn’t just a consumer problem – it’s a new frontier in enterprises’ battle against shadow IT. Ultimately, more extension permissions result in potentially bigger attack surfaces. … Continue reading Browser backdoors: Securing the new frontline of shadow IT

Blacklist untrustworthy apps that peek behind your firewall

With an increasing number of endpoints and expanding attack surfaces, dodgy apps can offer a way around your firewall. Due to data privacy concerns, Montana has passed the first bill in the United States to ban TikTok. Previously, India has banned 59 C… Continue reading Blacklist untrustworthy apps that peek behind your firewall

Securing your Apple device front through unified endpoint management

Apple has always touted the security and privacy capabilities of their devices. Being responsible for both the hardware and the associated OS has allowed Apple to create a closed-end approach to shield users against some common attacks. But it’s … Continue reading Securing your Apple device front through unified endpoint management

Why enterprises need rugged devices with integrated endpoint management systems

The debate within business organizations of whether to use consumer devices or to invest in rugged devices for the operations side of their business is as old as personal computing itself. And with the pandemic having shown that endpoint management is … Continue reading Why enterprises need rugged devices with integrated endpoint management systems

As technology develops in education so does the need for cybersecurity

The COVID-19 pandemic has had a profound impact on education, bringing about a sudden boom in remote and online learning. While the transition has forced many schools to implement innovative solutions, it has also revealed stark vulnerabilities in thei… Continue reading As technology develops in education so does the need for cybersecurity

DaaS, BYOD, leasing and buying: Which is better for cybersecurity?

In the digital age, staff expect employers to provide hardware, and companies need hardware that allows employees to work efficiently and securely. There are already a number of models to choose from to purchase and manage hardware, however, with remot… Continue reading DaaS, BYOD, leasing and buying: Which is better for cybersecurity?

Hexnode integrates with Okta to add new features to the identity and access management solution

Hexnode the emerging global leader in the UEM market has recently announced incorporating new integration with Okta a popular cloud-based identity and access management solution. The integration adds more flexibility to the solution in the area of iden… Continue reading Hexnode integrates with Okta to add new features to the identity and access management solution