Work from home, work from anywhere: Are you secure everywhere?

As millions of employees continue to work from home for the foreseeable future and in some cases perhaps indefinitely, balancing the ongoing demands of employee productivity and information security will be paramount. The historical “castle and moat” m… Continue reading Work from home, work from anywhere: Are you secure everywhere?

Enterprise mobile phishing increased by 37% in Q1 2020

There was a 37 percent increase worldwide in enterprise mobile phishing encounter rate between the fourth quarter of 2019 and the first quarter of 2020, according to Lookout. The cost of enterprise mobile phishing The report also shows that unmitigated… Continue reading Enterprise mobile phishing increased by 37% in Q1 2020

Managed Data Activity Monitoring (DAM) Is More Important Than Ever

Data activity monitoring (DAM) should be given strong consideration to help thwart potential data breaches and enhance security as work environments continue to evolve.

The post Managed Data Activity Monitoring (DAM) Is More Important Than Ever appeared first on Security Intelligence.

Continue reading Managed Data Activity Monitoring (DAM) Is More Important Than Ever

Solving the security challenges of remote working

Unprecedented times call for unprecedented actions and the ongoing COVID-19 pandemic has caused what is likely to be the biggest shift towards remote working that the world has ever seen. But, while the technology has been around for quite some time, r… Continue reading Solving the security challenges of remote working

SMBs Are Ready to Grow Into Enterprise Mobility Management (EMM) and Beyond

SMBs require enterprise-class solutions around mobility and endpoint management, but delivered in the way smaller firms acquire, deploy and manage IT management systems.

The post SMBs Are Ready to Grow Into Enterprise Mobility Management (EMM) and Beyond appeared first on Security Intelligence.

Continue reading SMBs Are Ready to Grow Into Enterprise Mobility Management (EMM) and Beyond

Manage All the Things: Unified Endpoint Management (UEM) and the Expanding IoT

Having management functions and visibility across wearables, ruggedized endpoints and other connected IoT equipment can give a business greater situational awareness when it comes to security.

The post Manage All the Things: Unified Endpoint Management (UEM) and the Expanding IoT appeared first on Security Intelligence.

Continue reading Manage All the Things: Unified Endpoint Management (UEM) and the Expanding IoT

Global remote work transitions fail to consider security gaps

Security measures and password best practices have not taken priority in many regions during the shift to remote work due to the COVID-19 pandemic, according to a survey by OneLogin. Nearly 1 in 5 (17.4%) global respondents have shared their work devic… Continue reading Global remote work transitions fail to consider security gaps

Is your smartphone pushing you to overshare?

The device people use to communicate online – a smartphone, desktop, or tablet – can affect the extent to which they are willing to overshare intimate or personal information about themselves, according to University of Pennsylvania researc… Continue reading Is your smartphone pushing you to overshare?

COVID-19’s Remote Workforce: Protect Your Rapidly Growing Attack Surface

With elevated endpoint risk and the need to respond rapidly to cybersecurity incidents, a managed detection and response (MDR) team can deploy quickly to virtually supplement your security teams.

The post COVID-19’s Remote Workforce: Protect Your Rapidly Growing Attack Surface appeared first on Security Intelligence.

Continue reading COVID-19’s Remote Workforce: Protect Your Rapidly Growing Attack Surface