Remote Access and GDPR Part 5: The Right-to-be-Forgotten

Hello and welcome once again to our ongoing series on the upcoming General Data Protection Regulation and its impact on the use of remote access and control software. This week we’ll be digging into the “right-to-be-forgotten.” More specifically, the rights of access, portability, rectification, and erasure.… Read on

Remote Access and GDPR Part 4: Data Minimization

Welcome back to our ongoing series on the 2018 General Data Protection Regulation, where we dive into the upcoming EU regulation and how it will impact the way we use remote access tools. Today our focus is on data minimization, at the heart of which is the general rule: process data only as needed.… Read on

Secure Remote Privileged Access for Your Vendors’ Technicians

Many organizations depend on a variety of external vendors to support their IT infrastructure, network and systems. In many cases, they overlook remote third-party access as a privileged access point that requires narrow security controls.

“Most organizations granting remote privileged application or operating system-level access to third-party users leave gaps that introduce significant security risks“

Gartner research “How to Secure Remote Privileged Access for Third-Party Technicians”

Facts

  • Malicious remote access represents “a significant hazard with networked POS devices,” accounting for 62% of incidents within POS environments.
Read on

Trustwave Report: Malware Continues to Exploit Unsecured Vendor Access

Unsecured remote access accounted for 29.7% of network compromises in 2016, more than double than the year prior, according to findings from the Trustwave Global Security Report.

Source: 2017 Trustwave Global Security Report

The number of incidents in corporate and internal network environments increased from 41% in 2015 to 43% in 2016, indicating companies need to review and improve network security controls to ensure their data is guarded against cyber-attacks.… Read on

Recovering from the PetyaWrap Ransomware Attack & Preparing for Whatever’s Next

Businesses that fail to secure their networks from known exploits will continue to be targeted by malware attacks. Yesterday, those who didn’t learn this lesson during the recent WannaCry fiasco got a malicious reminder to regularly update network security and patch their OS.… Read on