3 Practices to Avoid Security Risk in A Work from Home World
By Akshay Bhargava, Chief Product Officer, Malwarebytes Well before COVID-19 hastened people working from home, users embraced “bring your own device” (BYOD) practices. It created a proliferation of work-connected personal…
Security, Convenience & Privacy: A Neverending War
By Michael Covington, VP of Product Strategy, Wandera The veritable “Sophie’s Choice” among security decision-makers has increasingly become the three-way tug-of-war between security, convenience, and privacy. With the introduction of…
Cyber Crimes Will Increase with Shift to Teleworking
By Andy Sauer, Director of Cybersecurity, Steel Root With the sudden shift to work-from-home operations, businesses are now forced to deal with increased activity from both independent and nation-state cybercriminals….
Mitigating Against Ransomware: Don’t Let Backups Be the Back Door
By Rick Vanover, Senior Director, Product Strategy, Veeam The damage ransomware can inflict on businesses is staggering. For businesses who feel they have no choice but to pay cybercriminals in…
Returning to the Office After COVID-19: A Checklist for Business
As countries, states, and cities begin to ease lock-down restrictions, this checklist for reopening the office can help you jump start your return. You and your team have been quarantined…
The Devil Inside
Insider Threats on the rise By Mary Roark, VP of Marketing, Cyberhaven With growing economic uncertainty all indicators point to a sharp increase in insider threats across all industries. There…
Cybersecurity Education and Practice: Never Stop Learning
By Ken Sigler, Dan Shoemaker, and Anne Kohnke As the number of industries, organizations, and educational institutions continue to recognize the scope and impact of cybersecurity, the means in which…
COVID-19: How to Take Advantage of Teleworking
By Pedro Tavares, Editor-in-Chief seguranca-informatica.pt With the COVID-19 outbreak, companies and governments are taking preventive measures that include teleworking. This can be a turning point in the way we look…
Top 5 Coronavirus Scams
By Zack Schuler, founder and CEO of NINJIO One of the reasons NINJIO content is so successful at capturing and holding employees’ attention is its relevance – we release new…
How To Manage Your Small Business In Time Of Crisis
By Milica D. Djekic It’s always a challenge to manage your small business, but especially in times of crisis. Such a situation requires special skills, such as crisis management skills,…
Achieving Effective User Lifecycle Management Through Automation
By Jeff Stein, Information Security Architect, Reputation.com When considering the security of an enterprise, a key area ripe for automation should be user lifecycle management. The topic is important not…
Does SASE Tick the Box for The Future of Network Security?
By Yair Green, CTO at GlobalDots The enterprise of today works with an upgraded portfolio which can be viewed as the result of an overall digital transformation. This in turn…