Close the Security-Usability Gap with the Right RBI Solution

| | secure browsing
Remote Browser Isolation solutions are not created equal. Here’s a quick guide to help you distinguish between solutions that are fully mature and those that use cludgy, older 1st gen RBI technology. The post Close the Security-Usability Gap with the Right RBI Solution appeared first on Ericom Blog ... Read More

The Security Threats of Virtual Meetings

| | secure browsing
During virtual meetings malicious code in the portal can install malware on participants’ devices, including software that enables cameras to stay on, even after the meeting is over, or that installs ransomware on user devices. Protect your users with Virtual Meeting Isolation. The post The Security Threats of Virtual Meetings ... Read More

A Powerful New Approach to Phishing — the Biggest Issue in Cybersecurity

| | secure browsing
Stop criminals from exploiting vulnerabilities in web browsers -- the apps that your users use most, and can’t work without -- to keep malware from reaching your company networks The post A Powerful New Approach to Phishing — the Biggest Issue in Cybersecurity appeared first on Ericom Blog ... Read More

Improving Cybersecurity by Preventing Lateral Movement

Minimize damage from cyberattacks and malicious insiders by shutting down lateral movement within networks The post Improving Cybersecurity by Preventing Lateral Movement appeared first on Ericom Blog ... Read More