The search found 3916 results.
Blog Post
Enterprises should be aware that vendors and employees need to have very different logins and credentials. It’s imperative that businesses have much more granular control over remote vendor access to their networks. Find out more in this post.
Blog Post
Remote access has become a necessity in business environments. Whether it’s employees working from home or third-party vendors that need to access a customer network, remote access needs to provide secure and reliable connectivity—keyword here being secure.
Blog Post
Chances are you know of, or have even used, Okta. The authentication and identity management software is almost ubiquitous, offering multi-factor authentication for single users across large organizations. Unfortunately, Okta was the subject of a security breach back in January.
Blog Post
Using third parties is nearly inevitable in today’s business landscape. Most organizations need to outsource some of their operations, whether it’s on a large or small scale.
Blog Post
Healthcare organizations’ number one priority is patient care. They’re in the business of helping patients, so most of their time, energy, and resources are allocated there. However, cybersecurity is becoming an increasingly important topic for healthcare organizations.
Blog Post
As society enters a fourth industrial revolution, the manufacturing industry is facing vast, rapid changes. Those changes are marked by both innovation, productivity and efficiency improvements, and new, unforeseen risks.
Blog Post
Third parties continue to be one of the biggest cybersecurity risks to an organization. Last year, nearly half of organizations experienced a data breach caused by a third party and with ransomware on the rise, businesses need to lock down their third-party security strategy before a hacker finds a vulnerable access point.
Blog Post
Despite warnings from every cybersecurity professional, passwords are still being shared, compromised, and ineffectively managed. 66% of individuals are using the same password across devices and applications. 42% rely on sticky notes to manage passwords. And shockingly, 59% of IT professionals rely on memory to manage their corporate credentials.
Blog Post
A couple of decades ago, I received my first “authenticator” while working at Indiana University. As explained to me then, the device generated a secure token that only it and the server would know about. In this way, the servers I was helping to support would know that the bearer of that device (me) was legit.
Blog Post
The fourth industrial revolution has arrived. Also called industry 4.0, this term refers to the rise of smart factories and how manufacturing as an industry is quickly transitioning from place-based warehouses to networks of global software, automated systems, OT, and integration of the internet of things to manufacture anything and everything in entirely new ways.