Many organizations depend on a variety of external vendors to support their IT infrastructure, network and systems. In many cases, they overlook remote third-party access as a privileged access point that requires narrow security controls.
“Most organizations granting remote privileged application or operating system-level access to third-party users leave gaps that introduce significant security risks“
Gartner research “How to Secure Remote Privileged Access for Third-Party Technicians”
- Malicious remote access represents “a significant hazard with networked POS devices,” accounting for 62% of incidents within POS environments.
… Read on
Unsecured remote access accounted for 29.7% of network compromises in 2016, more than double than the year prior, according to findings from the Trustwave Global Security Report.
Source: 2017 Trustwave Global Security Report
The number of incidents in corporate and internal network environments increased from 41% in 2015 to 43% in 2016, indicating companies need to review and improve network security controls to ensure their data is guarded against cyber-attacks.… Read on
Are user credentials sufficient for secure authentication?
No. The use of user credentials (username and password) by itself presents a high risk of unauthorized access and is no longer a viable option for secure authentication.
Is two-factor authentication the solution?… Read on
The recent release of Netop Remote Control version 12.60 includes new features like support for Windows Server 2016 and an email-based multi-factor authentication option. You can learn all about the new release here , but if you ask me, the real excitement won’t be found in the release notes or be seen on the promotional pages of the website.… Read on
The new year is here and with it comes new consumer behavior and demands. Retailers are incorporating in-store innovations to provide the best customer experience possible, making their retail infrastructure even more complex than before.
With this in mind, we’ve compiled the best practices that retail ITs should consider to strengthen their value chain.… Read on