Audit logging now available in the Netop Portal

During the early morning hours of October 25th, Netop released an update to the Netop Remote Control Portal. This update introduces a new audit logging capability, providing users with a thorough record of all portal based activities.

Audit logs are an invaluable tool for monitoring the security and integrity of your systems.… Read on

Secure Remote Privileged Access for Your Vendors’ Technicians

Many organizations depend on a variety of external vendors to support their IT infrastructure, network and systems. In many cases, they overlook remote third-party access as a privileged access point that requires narrow security controls.

“Most organizations granting remote privileged application or operating system-level access to third-party users leave gaps that introduce significant security risks“

Gartner research “How to Secure Remote Privileged Access for Third-Party Technicians”

Facts

  • Malicious remote access represents “a significant hazard with networked POS devices,” accounting for 62% of incidents within POS environments.
Read on

Trustwave Report: Malware Continues to Exploit Unsecured Vendor Access

Unsecured remote access accounted for 29.7% of network compromises in 2016, more than double than the year prior, according to findings from the Trustwave Global Security Report.

Source: 2017 Trustwave Global Security Report

The number of incidents in corporate and internal network environments increased from 41% in 2015 to 43% in 2016, indicating companies need to review and improve network security controls to ensure their data is guarded against cyber-attacks.… Read on

[INFOGRAPHIC] NETWORK SECURITY: PREPARE FOR HUMAN ERROR

Are user credentials sufficient for secure authentication? 

No. The use of user credentials (username and password) by itself presents a high risk of unauthorized access and is no longer a viable option for secure authentication.

Is two-factor authentication the solution?Read on