Syndicated Blog

SecureLink
The latest trends in third-party remote access with how-to articles, industry best practices, and SecureLink happenings.

What is privileged access management (PAM)?

| | All Blog Posts
Privileged access management (PAM) refers to a segment of network security solutions that control and monitor internal employee privileged user activity. These tools address the vulnerabilities that are introduced when users with ...

Proposed Texas Bill Would Regulate Vendor Contracts

| | All Blog Posts
A bill in the pipeline of the Texas state legislature is intended to make vendor contracts with the government more streamlined, secure, and accountable. This push by lawmakers to address data and ...

SecureLink named a March 2019 Gartner Peer Insights Customers’ Choice for Privileged Access Management

| | All Blog Posts
Since 2003, the SecureLink team has focused on delivering superior products and customer service. We understand that our success can only be measured by the professionals around the world that directly work ...

VPNs and desktop sharing slow you down and put you at risk

| | All Blog Posts
When you think about providing remote access to your network, VPNs and desktop sharing are the two most frequently used methods. VPNs are great for allowing access to local resources, but they ...

Employee Remote Access Threats vs. Vendor Access Threats

The last decade saw a dramatic increase of enterprise employees leaving the confines of the company building to work remotely. The State of the Remote Job Marketplace report from FlexJobs found 2.9% ...

Cybersecurity Predictions for 2019

| | All Blog Posts
This year will present new risks and challenges for enterprise organizations. In these early weeks, expanded security protocols are being reviewed and implemented to protect against emerging threats. Because of this, there ...

Top Lessons from 2018 Breaches

| | All Blog Posts
Network security has been tested in increasingly aggressive ways, particularly in the past five years. Bad actors and risky user behavior have brought new challenges and vulnerabilities. With each new year, it’s ...

Starwood breach shows the vulnerability of the hospitality and travel industry

| | Industry Insights
The hospitality and travel industries have attracted some of the most significant cybercrime incidents in the last few years, and there are several reasons for this. The sector deals with billions of ...

How to Treat Technology Vendors

The dynamic between an enterprise and their technology providers can be tricky to navigate. It doesn’t quite meet the definition of a traditional buyer and vendor relationship, but it’s also more complex ...

How Vendors Can Navigate the Challenges of Remote Support

A recent SecureLink survey found that for every technology vendor there are 239 customers who rely on their support. That’s a lot of people depending on your services – many of which ...
Loading...