How to Safely Access Sensitive Data From Home – Part 2
Our last blog provided an introduction to technologies controlling and protecting employee internet access in the modern enterprise. We also discussed the classic ways internet access is being protected. Make sure to catch up on it here if you have not already. This blog post will focus on cutting edge ... Read More
How to Safely Access Sensitive Data From Home – Part 2
Our last blog provided an introduction to technologies controlling and protecting employee internet access in the modern enterprise. We also discussed the classic ways internet access is being protected. Make sure to catch up on it here if you have not already. This blog post will focus on cutting edge ... Read More
How to Safely Access Sensitive Data From Home – Part 1
In the new era of working-from-home learning to protect your sensitive data from the dangers of the internet is a challenge the majority of IT teams are facing today. You don’t have to be a cyber security expert to know that you need to be careful when accessing the internet ... Read More
How to Safely Access Sensitive Data From Home – Part 1
In the new era of working-from-home learning to protect your sensitive data from the dangers of the internet is a challenge the majority of IT teams are facing today. You don’t have to be a cyber security expert to know that you need to be careful when accessing the internet ... Read More
Non-Persistent VMs with a Persistent User Experience – Make Your IT Admin’s Life Easier
Desktop virtualization solutions and use cases Desktop virtualization for end users in organizations is not a new concept. Since the 90’s, Citrix has been offering end users remote access to corporate software running in the datacenter. While managed virtual desktop infrastructure has provided a full desktop in the datacenter since ... Read More
Non-Persistent VMs with a Persistent User Experience – Make Your IT Admin’s Life Easier
Desktop virtualization solutions and use cases Desktop virtualization for end users in organizations is not a new concept. Since the 90’s, Citrix has been offering end users remote access to corporate software running in the datacenter. While managed virtual desktop infrastructure has provided a full desktop in the datacenter since ... Read More
Mythbusting Network Security Architecture Best Practices
Given the cyberattack surface area presented by networks, it’s little surprise that network security professionals try to adhere to network security architecture best practices. A network must have security embedded in its very design. However, while best practices like network segmentation and device hardening are wise and worth pursuing, they ... Read More
Thinking Beyond Cybersecurity Vulnerability Assessments: What’s Next?
Having vulnerabilities isn’t always a bad thing. In personal interactions, for instance, being vulnerable can lead to deeper, more meaningful relationships. But we’re not talking psychology today. We’re talking cybersecurity. And when it comes to IT infrastructure, vulnerabilities are nothing but bad. The average cost of a data security breach ... Read More
Credential Stuffing Attack Prevention and Mitigation
You know how security experts keep telling you not to use the same password on multiple accounts? Yup, there’s a good reason for that. It’s called credential stuffing. It’s a type of cyberattack that affects the security of millions of people. As bad as that might sound, there are ways ... Read More
Benefits of the Least Privileged Principle: Assuming A Breach
Extending the Benefits of the Principle of Least Privilege If you’ve ever had a job where certain information was dispersed on a need-to-know basis (and who hasn’t), then you can relate to the principle of least privilege (PoLP). In a broad sense, it’s about restricting access to sensitive data. Only ... Read More

