Security threats
Top 10 Web Application Vulnerabilities and How to Mitigate Them
The inability to identify vulnerabilities in a web application can leave it unprotected against potential attackers, resulting in the mostContinue reading The post Top 10 Web Application Vulnerabilities and How to Mitigate ...
Best Cyber Security Practices for MSPs
Over 30 millions businesses have fewer than 1,000 employees and many don’t have the IT budget to provide effective network security. Managed Service Providers (MSP) are a godsend for small businesses because ...
The CISO’s Dilemma: Balancing Security, Productivity With a Housebound Workforce
How are CISOs managing the tug-of-war between IT security and worker productivity in this new, remote-first era? Before the pandemic, remote work was already on a gradual rise. A FlexJobs survey revealed ...
A Passpoint Solution for MAC Randomization
Although MAC Randomization has been around for a few years, it has really grown in popularity with the beta version of Apple iOS 14 update because it’s a default enabled setting. MAC ...
Remote, Hybrid Work Need Better Data Security
2020 is a uniquely transformative year. Prompted by a global pandemic, we’ve been forced to change many things about how we live, work and relate. For most businesses, this means a rapid ...
Security Threats Targeting the Remote Workforce
Having a remote workforce has become more popular with the advancement of technology and the ease of working in the digital space. However, with a pandemic sweeping across the world, there has ...
Use of High-Risk Apps and Websites Increased 161% Amid Work-from-Home Shift, New Research Shows
The August 2020 edition of the Netskope Cloud and Threat Report highlights a 161% increase in visits to high-risk apps and sites brought on by a 64% remote workforce ...
5 Biggest Data Breaches of 2020 (So Far)
Number of data breaches in 2020 has almost doubled with 3,950 confirmed breaches against 2,103 recorded breaches in 2019! EverContinue reading The post 5 Biggest Data Breaches of 2020 (So Far) appeared ...
Are Passwords Secure?
Credential-based authentication is the method nearly all network users are used to and has been a common tool for decades. But unlike other decades-old technology, passwords have not been phased out of ...
How To Improve Asset Management and Security
The future of asset management requires organizations invest in digitization, which has the added benefit of improving security You would be amazed at how many organizations still use archaic technologies to keep ...

