Blog Listing

Do you know how many third-party vendors access your network?
Do you know how many third-party vendors access your network?
.node__body h2 { font-size: 2.6rem; line-height: 3rem; font-weight: 400; } @media screen and (min-width: 768px) { .node__body h
What’s the difference between third-party remote access and privileged access?
What’s the difference between third-party remote access and privileged access?
.node__body h2 { font-size: 2.6rem; line-height: 3rem; font-weight: 400; } @media screen and (min-width: 768px) { .node__body h
How to prepare for GDPR with third-party vendors
How to prepare for GDPR with third-party vendors
.node__body h2 { font-family: proxima-nova, sans-serif; font-size: 2.6rem; line-height: 3rem; font-weight: 400; } @media scree
Is a longer password better than a complex one?
Is a longer password better than a complex one?
YES!! Longer passwords are better.
Compare RDP vs VNC in simple language
Compare RDP vs VNC in simple language
 RDP or VNC AccessA friend recently asked me to explain the difference between RDP and VNC protocol to remotely access a computer.
4-Methods
Four methods to access cloud computers securely
 Networks in the cloudIt is easy to start a virtual computer these days in a cloud datacenter managed by Amazon AWS or Microsoft Azure
Five reasons single-password authentication should be banned
Five reasons single-password authentication should be banned
With the rapidly growing number of sophisticated cyber-attacks, such as phishing and ransomware, single-factor authentication has had its day. One way to fight back against the rise in cyber-attacks is by using strong multi-factor authentication.
Four tips on implementing 2FA policies
Four tips on implementing 2FA policies
If you’re still authenticating remote users with a single password, it’s time to make a change. There’s just too much at stake. With that in mind, here are four things to keep in mind when considering a two-factor authentication policy for your organization - and one thing you should probably avoid.
Is your casino network under attack?
Is your casino network under attack?
See how to streamline your security methods and ensure your gaming business doesn’t suffer a hacking incident. This article covers recent casino data breaches and reveals how to prevent cybercriminals from accessing sensitive, confidential data on your network.
Five security questions your law firm should ask
Five security questions your law firm should ask
Law firms are appealing targets for cybercriminals. Home to a multitude of sensitive, personal, confidential, financial information, what better place to attack in order to steal some juicy data? There’s certainly a few questions that should be on your security radar, let’s address them in this blog.
Hospitality: Stopping third-party breaches
Hospitality: Stopping third-party breaches
The more technology advances, the more this creates potential security issues for the hospitality world. Learn ways you can protect your hotel from costly cybercrimes, hacking attacks, and reputational damage.
Retailers: Are vendors leaving you vulnerable?
Retailers: Are vendors leaving you vulnerable?
The threat is real. With all the security risks facing retailers today, we look at an approach to secure your remote support and deliver rapid, safe vendor access, track every system session, and gain proof of PCI compliance.
Cybersecurity and third-party vendor access
Cybersecurity and third-party vendor access
There’s a trend of hackers being able to remain on an organization’s network for periods of time – without even being detected. Does this make you think about what measures you currently have in place to provide visibility of who is on your network, and what they are doing?
Can you really trust your VPN?
Can you really trust your VPN?
As the need grows for supporting geographically spread vendors, how can you make sure you’re validating identities and encrypting all data to keep your network secure?
Education: How are you securing access to data?
Education: How are you securing access to data?
Due to the rise in cyber threats, educational institutions are facing increasing pressure to protect their sensitive data. In addition, they have to comply with FERPA or risk facing penalties. Read this blog to learn steps your organization can take to prevent a security attack.
Identifying new cybersecurity threats
Identifying new cybersecurity threats
Discover emerging cybersecurity threats - and ways your organization can combat them. In this blog, you’ll learn about the latest tricks cybercriminals are using to target your company and find guidance on how to be vigilant against these attacks.
Third-party vendors and HIPAA compliance
Third-party vendors and HIPAA compliance
Considering the risks of HIPAA non-compliance, health care companies generally benefit from hiring third party vendors that specifically handle HIPAA regulatory compliance. To fully protect patients, these vendors should have clear policies that restrict access, remain transparent and auditable, and maintain the most updated data security measures.
Keep your third-party vendors close
Keep your third-party vendors close
Whether you work with only a few vendors, hundreds, or thousands, your network is only as safe as the security practices of your weakest partner.
IoT threats to third-party networks
IoT threats to third-party networks
Outsourcing offers key advantages in costs and subject matter expertise. Yet, the safety of your business data depends on IoT risk management and the security protocols of vendor partners.
Healthcare cybersecurity: Hacking medical devices
Healthcare cybersecurity: Hacking medical devices
Imagine in the future a critical, personal medical device taken offline by ransomware. Is the Healthcare industry prepared for this cybersecurity risk?