Many organizations depend on a variety of external vendors to support their IT infrastructure, network and systems. In many cases, they overlook remote third-party access as a privileged access point that requires narrow security controls.
“Most organizations granting remote privileged application or operating system-level access to third-party users leave gaps that introduce significant security risks“
Gartner research “How to Secure Remote Privileged Access for Third-Party Technicians”
- Malicious remote access represents “a significant hazard with networked POS devices,” accounting for 62% of incidents within POS environments.
… Read on
Unsecured remote access accounted for 29.7% of network compromises in 2016, more than double than the year prior, according to findings from the Trustwave Global Security Report.
Source: 2017 Trustwave Global Security Report
The number of incidents in corporate and internal network environments increased from 41% in 2015 to 43% in 2016, indicating companies need to review and improve network security controls to ensure their data is guarded against cyber-attacks.… Read on
As the saying goes, “Fool me once…”
Businesses that fail to secure their networks from known exploits will continue to be targeted by malware attacks. Yesterday, those who didn’t learn this lesson during the recent WannaCry fiasco got a malicious reminder to regularly update network security and patch their OS.… Read on
Companies Aren’t Ready for the GDPR
During a recent group webinar with infosecurity-magazine.com (you can watch the full recording of that here), we asked 200 IT professionals to rate their organizations’ preparedness for GDPR. These were their responses:
- 17% – Very prepared
- 13% – Almost ready
- 40% – We’ve got a long way to go
- 30% – I don’t think we’ve done a thing
With less than a year before it takes effect, 70% of organizations surveyed are not even close to being ready for the GDPR.… Read on
With the release of the updated General Data Protection Regulation, its impact on remote control software has been on my mind a lot recently. If the topic of remote control and data protection doesn’t ring your bell, I understand. Unless you are a member of the help desk crowd, you probably don’t share my interest in remote control software.… Read on