Securing VPN and RDP access to sensitive resources [Free e-book and webinar]

At times, life during COVID-19 pandemic can feel like something from a dystopian novel. If anyone told us ahead of time that we’d be working from home due to a deadly virus outbreak in 2020, we probably wouldn’t have believed …
The post Securing VPN a… Continue reading Securing VPN and RDP access to sensitive resources [Free e-book and webinar]

Five Worthy Reads: Has the pandemic accelerated digital transformation?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore how the pandemic and the rise of the remote work culture have enabled digital transformation.

Ever sin… Continue reading Five Worthy Reads: Has the pandemic accelerated digital transformation?

Cisco Advances Effort to Simplify Security

Cisco Systems has updated SecureX, a free console it provides for its portfolio of security offerings, to include sample extended detection and response (XDR) workflows along with additional analytics and a refreshed Ribbon interface through which sec… Continue reading Cisco Advances Effort to Simplify Security

Is IT security under attack?

From credential theft to network vulnerability exploitation and ransomware incidents on highly secure organizations, the year 2020 has been surprisingly rough on IT security. In the wake of the COVID-19 pandemic, companies around the world are reportin… Continue reading Is IT security under attack?

Five worthy reads: Preparing an incident response plan for the pandemic and beyond

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. With the rising concern over cyberattacks in the distributed workforce, this week we explore the concept of cybersecurity in… Continue reading Five worthy reads: Preparing an incident response plan for the pandemic and beyond

Sophisticated phishing

Most of us can think of a time when we received a phishing email. In fact, most phishing emails are easy to identify, and automatically go to spam.
However, in this ongoing pandemic, hackers are adopting advanced tactics that cleverly …
The post Sophis… Continue reading Sophisticated phishing

Multi Factor Authentication for Remote Desktop Gateway and RDP Connections

Some or even your entire workforce might now be dispersed but their access to company networks still needs to be protected. Here we look at why a second factor of authentication is recommended to protect remote access. RDP Connections The Microsoft Rem… Continue reading Multi Factor Authentication for Remote Desktop Gateway and RDP Connections

Domain controller patch alert! Vulnerability grants domain admin access in 10 seconds

A critical Active Directory vulnerability (CVE-2020-1472)   has been making headlines for being the most notorious elevation of privilege bug because it can affect all computers and domain controllers in an organization.
 This high-risk vulnerability, … Continue reading Domain controller patch alert! Vulnerability grants domain admin access in 10 seconds

Build a resilient cybersecurity framework by transforming your IT team into a security team

More organizations than ever before have shifted to a hybrid work culture to reduce the impact of COVID-19. This unprecedented change has not only given rise to new security challenges, but has also considerably increased the surface area available fo… Continue reading Build a resilient cybersecurity framework by transforming your IT team into a security team

Understanding how attackers move inside your organization

Cyberthreats have been coming at us from the left, right, and center. The number of cyberattacks is forever on the rise, and companies need to keep ramping up their security measures to protect themselves. It’s important that these measures …
The post … Continue reading Understanding how attackers move inside your organization